Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
unbound-control-setup-check-openssl.patch | unbound-control-setup: check openssl Before doing anything, check if openssl binary (which we will use) is available, and print a useful error message if it is not found. diff --git a/smallapp/unbound-control-setup.sh.in b/smallapp/unbound-control-setup.sh.in index eaf1d082..be804879 100644 |
Michael Tokarev <mjt@tls.msk.ru> | no | 2022-04-19 | ||
do-not-chown-control-socket.patch | do not chown control socket There's no need to chown the control socket to the unbound user, only group ownership is actually useful. diff --git a/daemon/remote.c b/daemon/remote.c index 675ef439..76eb6118 100644 |
Michael Tokarev <mjt@tls.msk.ru> | no | 2022-04-28 | ||
do-not-look-at-pidfile.patch | diff --git a/daemon/unbound.c b/daemon/unbound.c index 457a0803..9d8491b3 100644 |
no | ||||
fix-812-fix-846-by-using-the-SSL_OP_IGNORE_UNEXPECTE.patch | Fix #812, fix #846, by using the SSL_OP_IGNORE_UNEXPECTED_EOF option to ignore the unexpected eof while reading in openssl >= 3. | George Thessalonikefs <george@nlnetlabs.nl> | not-needed | debian upstream | upstream, https://github.com/NLnetLabs/unbound/commit/d7e776114114c16816570e48ab3a27eedc401a0e | 2023-03-17 |
CVE-2023-50387_CVE-2023-50868_1.16.1-1.17.1.patch | diff --git a/services/authzone.c b/services/authzone.c index 3898767c..4c63b2e0 100644 |
no |