package/unbound: bump version to 1.10.1 for security fixes
Fixes the following security vulnerabilities: CVE-2020-12662: Unbound can be tricked into amplifying an incoming query into a large number of queries directed to a target. CVE-2020-12663: Malformed answers from upstream name servers can be used to make Unbound unresponsive. Signed-off-by: Stefan Ott <stefan@ott.net> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
This commit is contained in:
parent
497e3dff7e
commit
796cc10fa0
@ -1,3 +1,3 @@
|
||||
# Locally calculated
|
||||
sha256 152f486578242fe5c36e89995d0440b78d64c05123990aae16246b7f776ce955 unbound-1.10.0.tar.gz
|
||||
sha256 b73677c21a71cf92f15cc8cfe76a3d875e40f65b6150081c39620b286582d536 unbound-1.10.1.tar.gz
|
||||
sha256 8eb9a16cbfb8703090bbfa3a2028fd46bb351509a2f90dc1001e51fbe6fd45db LICENSE
|
||||
|
@ -4,7 +4,7 @@
|
||||
#
|
||||
################################################################################
|
||||
|
||||
UNBOUND_VERSION = 1.10.0
|
||||
UNBOUND_VERSION = 1.10.1
|
||||
UNBOUND_SITE = https://www.unbound.net/downloads
|
||||
UNBOUND_DEPENDENCIES = host-pkgconf expat libevent openssl
|
||||
UNBOUND_LICENSE = BSD-3-Clause
|
||||
|
Loading…
Reference in New Issue
Block a user