On 2022/08/26 17:47, void wrote:
> On Wed, Aug 24, 2022 at 03:03:01PM +0100, Stuart Henderson wrote:
> > Anyone want to test this?
> >
> > Any OKs?
>
> Hello,
>
> Seemed to patch OK and built OK with a -current made yesterday, on aarch64.
>
> I'm a newbie at building/patching openbsd, so if the
On Wed, Aug 24, 2022 at 03:03:01PM +0100, Stuart Henderson wrote:
> Anyone want to test this?
>
> Any OKs?
Works fine here and nothing jumps out at me in the diff.
ok tb
On Wed, Aug 24, 2022 at 03:03:01PM +0100, Stuart Henderson wrote:
Anyone want to test this?
Any OKs?
Hello,
Seemed to patch OK and built OK with a -current made yesterday, on aarch64.
I'm a newbie at building/patching openbsd, so if there's anything you
can suggest I test, I'll test. unbound
Anyone want to test this?
Any OKs?
The CVEs mentioned are these:
=== CVE-2022-30698
Unbound prior to 1.16.2 allows malicious users to trigger continued
resolvability of malicious domain names, even after their revocation
from the parent zone, via a novel type of the "ghost domain names"
attack t
Note, there's a new directory so use patch -p0 to apply it.
Here's an update to unbound 1.5.4. There was some file reorganisation so
I am providing two diffs: the one inline in this email shows the *code*
changes only for those who are interested to review it; this will not
build on its own.
For applying and testing, use http://junkpile.org/unbound-1.5.4.d