40030e1c6f
Fixes the following security issue: - CVE-2024-43167: A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific sequences of API calls to cause a segmentation fault See announcement: https://nlnetlabs.nl/news/2024/Aug/15/unbound-1.21.0-released/ See also change log: https://nlnetlabs.nl/projects/unbound/download/#unbound-1-21-0 This commit also updates the _SITE url from [1] to [2], to follow the HTTP redirect, and the url published on the download page [3]. Finally, this commit adds a comment in the hash file that the PGP signature was checked. [1] https://www.unbound.net/downloads [2] https://nlnetlabs.nl/downloads/unbound [3] https://nlnetlabs.nl/projects/unbound/download Signed-off-by: Julien Olivain <ju.o@free.fr> [Peter: Mark as security bump, add CVE info] Signed-off-by: Peter Korsgaard <peter@korsgaard.com> (cherry picked from commit ed34c4c77b8b2a830c7a9ffb1d75c7bf1e35a7c4) Signed-off-by: Peter Korsgaard <peter@korsgaard.com> |
||
---|---|---|
.. | ||
Config.in | ||
S70unbound | ||
unbound.hash | ||
unbound.mk |