Debian Patches

Status for unbound/1.22.0-2+deb13u1

Patch Description Author Forwarded Bugs Origin Last update
do-not-chown-control-socket.patch do not chown control socket
There's no need to chown the control socket to the unbound user,
only group ownership is actually useful.

diff --git a/daemon/remote.c b/daemon/remote.c
index 675ef439..76eb6118 100644
Michael Tokarev <mjt@tls.msk.ru> no 2022-04-28
Fix-RebirthDay-Attack-CVE-2025-5994.patch Fix RebirthDay Attack CVE-2025-5994, reported by Xiang Li from AOSP Lab Nankai University "W.C.A. Wijngaards" <wouter@nlnetlabs.nl> not-needed debian upstream, https://github.com/NLnetLabs/unbound/commit/5bf82f246481098a6473f296b21fc1229d276c0f 2025-07-16
CVE-2025-11411.patch Fix CVE-2025-11411 (possible domain hijacking attack)
Reported by Yuxiao Wu, Yunyi Zhang, Baojun Liu and Haixin Duan from
Tsinghua University.
Yorgos Thessalonikefs <yorgos@nlnetlabs.nl> yes upstream https://github.com/NLnetLabs/unbound/commit/a33f0638e1dacf2633cf2292078a674576bca852 2025-10-22
CVE-2025-11411-additional-nodata.patch Additional fix for CVE-2025-11411 (possible domain hijacking attack), to include YXDOMAIN and non-referral nodata answers in
the mitigation as well, reported by TaoFei Guo from Peking University, Yang
Luo and JianJun Chen from Tsinghua University.
Yorgos Thessalonikefs <yorgos@nlnetlabs.nl> not-needed upstream, https://github.com/NLnetLabs/unbound/commit/f6269baa605d31859f28770e01a24e3677e5f82c 2025-11-26

All known versions for source package 'unbound'

Links