| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
| |
Update unbound from 1.12.0 to 1.13.0
MFC after: 1 week
Security: CVE-2020-28935
Notes:
svn path=/head/; revision=368478
|
|
|
|
|
|
|
|
|
| |
Update unbound 1.11.0 --> 1.12.0.
MFC after: 1 month.
Notes:
svn path=/head/; revision=367094
|
|
|
|
|
|
|
|
|
| |
Update unbound 1.10.1 --> 1.11.0.
MFH: 1 month
Notes:
svn path=/head/; revision=364721
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Update unbound 1.9.6 --> 1.10.1.
Bug Fixes:
- CVE-2020-12662 Unbound can be tricked into amplifying an incoming
query into a large number of queries directed to a target.
- CVE-2020-12663 Malformed answers from upstream name servers can be
used to make Unbound unresponsive.
Reported by: emaste
MFC after: 3 days
Relnotes: yes
Security: CVE-2020-12662, CVE-2020-12663
Notes:
svn path=/head/; revision=361344
|
|
|
|
|
|
|
|
|
|
| |
Update unbound 1.9.2 --> 1.9.6.
MFC after: 3 days
Security: CVE-2019-18934 (fixed by 1.9.5)
Notes:
svn path=/head/; revision=356228
|
|
|
|
| |
Notes:
svn path=/head/; revision=349720
|
|
|
|
| |
Notes:
svn path=/head/; revision=333562
|
|
|
|
|
|
|
| |
adopted upstream, greatly reducing the diff.
Notes:
svn path=/head/; revision=276605
|
|
|
|
| |
Notes:
svn path=/head/; revision=249141
|
|
Notes:
svn path=/head/; revision=249140
|