summaryrefslogtreecommitdiff
path: root/usr.sbin/unbound
AgeCommit message (Collapse)Author
2024-10-07merge unbound 1.21.1Stuart Henderson
2024-10-07Fix unbound CVE-2024-8508, put a limit on resources used for handlingStuart Henderson
DNS compression. OK florian From unbound 1.21.1 (rest will be merged shortly).
2024-09-04merge unbound 1.21.0Stuart Henderson
2024-09-04import unbound 1.21.0, ok phessler florianStuart Henderson
2020-08-24update to unbound 1.11.0, tests tb@ dtucker@, ok tb@Stuart Henderson
2019-09-11import unbound 1.9.3, thanks gonzalo@ dtucker@ for tests.Stuart Henderson
2014-11-20update to Unbound 1.5.0, ok sthen@Brad Smith
2024-06-13merge unbound 1.20.0Stuart Henderson
2024-06-13import unbound 1.20.0, ok florianStuart Henderson
2024-04-13merge unbound 1.19.3Stuart Henderson
2024-04-13import unbound 1.19.3, ok florianStuart Henderson
2024-04-12merge unbound updateStuart Henderson
2024-04-12import unbound 1.19.2, reminded by florian@Stuart Henderson
(yes I know there is a newer one, I'll update on top)
2024-03-11apply https://nlnetlabs.nl/downloads/unbound/patch_CVE-2024-1931.diff toStuart Henderson
unbound, fixing an indefinite loop that could be triggered by a client against an unbound server where the (non-default) configuration "ede: yes" is used. https://nlnetlabs.nl/downloads/unbound/CVE-2024-1931.txt ok florian@
2024-02-13Fix for CVE-2023-50387 and CVE-2023-50868.Florian Obser
Both can be used to cause high CPU load and potentially denial of service with specifically crafted DNSSEC responses.
2018-09-17import unbound 1.7.3, testing from benno@ and Brad.Stuart Henderson
2023-09-14satisfy non-c99 compilersTheo de Raadt
2023-09-11Improve handling of ENOBUFS by not running in a tight loop forever.Florian Obser
This cherry-picks upstream git commit 0ee44ef384593ed0382d1ce6048d5a9c9440b45c. Issue reported by landry@, which could be traced back to a buggy WiFi driver that would constantly return ENOBUFS. This in turn lead unwind(8) enter a tight loop through poll / sendto without making any progress and burning 100% cpu. OK sthen
2023-09-06remove doubled entry in config.h.inStuart Henderson
2023-09-06regenStuart Henderson
2023-09-06remove extra blank line to reduce changes to upstream in a locally-patched fileStuart Henderson
2023-09-06whitespace fixes, problem with util/tube.c pointed out by jsg (probablyStuart Henderson
introduced by the diff/patch process I use to avoid stomping on the local changes in updates)
2023-09-05oops, forgot to rm these before cvs importStuart Henderson
2023-09-05merge unbound-1.18.0Stuart Henderson
2023-09-05import unbound 1.18.0, ok florianStuart Henderson
2022-10-20remove file no longer present in unbound 1.17.0Stuart Henderson
2022-10-20merge unbound 1.17.0Stuart Henderson
2022-10-20import unbound 1.17.0, ok florianStuart Henderson
2022-09-23merge unbound 1.16.3Stuart Henderson
2022-08-29merge updatesStuart Henderson
2022-08-29import unbound 1.16.2, ok florian@ tb@ also tested by Alex HolstStuart Henderson
2022-06-07merge unbound 1.16.0Stuart Henderson
2022-06-07update to unbound 1.16.0, discussed with florian@, test from Renaud AllardStuart Henderson
2022-02-23merge upstream commit to unbound: "Fix that TCP interface does not useStuart Henderson
TLS when TLS is also configured"
2022-02-23merge unbound 1.15.0Stuart Henderson
2022-02-23update to unbound 1.15.0, ok florian@Stuart Henderson
2022-01-09unwind/unbound: prepare for opaque DSA and RSA.Theo Buehler
Use the OpenSSL 1.1 codepath using accessors that have been available since LibreSSL 2.7 instead of reaching into the structs. ok sthen
2021-11-19Allow interface names as scope-id in IPv6 link-local addresses.Florian Obser
For example, this makes forward-zone: name: "." forward-addr: fe80::20d:b9ff:fe46:c7f4%vio0 forward-first: yes work instead of using fe80::20d:b9ff:fe46:c7f4%1 for the forward-addr. This has been submitted upstream. sthen@ is fine with carrying this as a local diff. Requested by & OK kn
2021-08-13merge unbound-1.13.2 / regen configure, ok florianStuart Henderson
2021-08-13import unbound 1.13.2, ok florian@Stuart Henderson
2021-07-12Change the error reporting pattern throughout the tree when unveilBob Beck
fails to report the path that the failure occured on. Suggested by deraadt@ after some tech discussion. Work done and verified by Ashton Fagg <ashton@fagg.id.au> ok deraadt@ semarie@ claudio@
2021-03-12merge unbound-1.13.1Stuart Henderson
2021-03-12update to unbound-1.13.1, tested by gnezdo@Stuart Henderson
2021-01-21Backport "Squelch udp connect 'no route to host' errors" from upstream.Stuart Henderson
Problem reported and diff tested by danj@ From 5906811ff19f005110b2edbda5aa144ad5fa05b1 Mon Sep 17 00:00:00 2001 From: "W.C.A. Wijngaards" <wouter@nlnetlabs.nl> Date: Tue, 1 Dec 2020 09:09:13 +0100 Subject: [PATCH] - Fix #358: Squelch udp connect 'no route to host' errors on low verbosity.
2021-01-06do not call log_addr() when the address is NULLanton
ok florian@
2020-12-10merge unbound 1.13.0Stuart Henderson
2020-12-10import unbound 1.13.0, heavy lifting done by florian@Stuart Henderson
2020-11-11remove reference to non-existent pidfile;Jason McIntyre
issue raised by martin vahlensieck discussed with and ok sthen
2020-10-28merge Unbound 1.12.0Stuart Henderson
2020-10-28import Unbound 1.12.0, ok tb@Stuart Henderson