** Description changed:
- Scheduled-For: 22.12
- Upstream: tbd
- Debian: 1.13.1-1
+ Upstream: 1.13.2
+ Debian: 1.13.1-1
Ubuntu: 1.13.1-1ubuntu1
-
- Debian typically updates unbound every 1 months on average, but it was
- last updated 21.02 and looks overdue. Check back in on this monthly.
-
- No release expected for unbound this cycle
+ Debian typically updates unbound every 1-2 months on average, but it was
+ last updated 21.02 and looks overdue. There is a new upstream version,
+ however, so may be worth going ahead of debian and/or updating it in
+ Debian and syncing it.
### New Debian Changes ###
unbound (1.13.1-1) unstable; urgency=medium
- * New upstream version 1.13.1
- * debian/gbp.conf: [import-orig] upstream-signatures = True
- * Drop debian/patches/0002-Fix-358-Squelch-udp-connect-no-route-to-host-
- errors-.patch (included in 1.13.1 release)
- * debian/copyright: 2021
+ * New upstream version 1.13.1
+ * debian/gbp.conf: [import-orig] upstream-signatures = True
+ * Drop debian/patches/0002-Fix-358-Squelch-udp-connect-no-route-to-host-
+ errors-.patch (included in 1.13.1 release)
+ * debian/copyright: 2021
- -- Robert Edmonds Tue, 09 Feb 2021 17:53:57 -0500
+ -- Robert Edmonds Tue, 09 Feb 2021 17:53:57 -0500
unbound (1.13.0-1) unstable; urgency=medium
- * New upstream version 1.13.0
- - Fix CVE-2020-28935: PID file vulnerability (Closes: #977165)
- * debian/patches/0002-Fix-358-Squelch-udp-connect-no-route-to-host-
- errors-.patch: Cherry-pick upstream commit
- 5906811ff19f005110b2edbda5aa144ad5fa05b1 to suppress UDP connect()
- errors on low verbosity
+ * New upstream version 1.13.0
+ - Fix CVE-2020-28935: PID file vulnerability (Closes: #977165)
+ * debian/patches/0002-Fix-358-Squelch-udp-connect-no-route-to-host-
+ errors-.patch: Cherry-pick upstream commit
+ 5906811ff19f005110b2edbda5aa144ad5fa05b1 to suppress UDP connect()
+ errors on low verbosity
- -- Robert Edmonds Wed, 23 Dec 2020 19:34:24 -0500
+ -- Robert Edmonds Wed, 23 Dec 2020 19:34:24 -0500
unbound (1.12.0-1) unstable; urgency=medium
- * New upstream version 1.12.0
+ * New upstream version 1.12.0
- -- Robert Edmonds Mon, 19 Oct 2020 00:35:38 -0400
+ -- Robert Edmonds Mon, 19 Oct 2020 00:35:38 -0400
unbound (1.11.0-1) unstable; urgency=medium
- [ Simon Deziel ]
- * systemd: don't create a PID file
- * debian/package-helper: mount --bind systemd notify socket into chroot
- (Closes: #867187)
+ [ Simon Deziel ]
+ * systemd: don't create a PID file
+ * debian/package-helper: mount --bind systemd notify socket into chroot
+ (Closes: #867187)
- [ Robert Edmonds ]
- * New upstream version 1.11.0
- - Merge PR #241 by Robert Edmonds: contrib/libunbound.pc.in: Do not use
- 'Requires:'. (Closes: #958331)
- - Introduce 'include-toplevel:' configuration option.
- - Adds its own implementation of Frame Streams for dnstap support.
- * debian/control: Remove build dependency on libfstrm-dev
- * debian/unbound.conf: Use 'include-toplevel:' instead of 'include:'
- (Closes: #950754)
- * debian/NEWS: Add entry for 1.11.0-1 regarding the change of
- /etc/unbound/unbound.conf to using the 'include-toplevel:' directive
- * debian/patches/: Refresh patches
+ [ Robert Edmonds ]
+ * New upstream version 1.11.0
+ - Merge PR #241 by Robert Edmonds: contrib/libunbound.pc.in: Do not use
+ 'Requires:'. (Closes: #958331)
+ - Introduce 'include-toplevel:' configuration option.
+ - Adds its own implementation of Frame Streams for dnstap support.
+ * debian/control: Remove build dependency on libfstrm-dev
+ * debian/unbound.conf: Use 'include-toplevel:' instead of 'include:'
+ (Closes: #950754)
+ * debian/NEWS: Add entry for 1.11.0-1 regarding the change of
+ /etc/unbound/unbound.conf to using the 'include-toplevel:' directive
+ * debian/patches/: Refresh patches
- -- Robert Edmonds Sun, 09 Aug 2020 20:57:15 -0400
+ -- Robert Edmonds Sun, 09 Aug 2020 20:57:15 -0400
unbound (1.10.1-1) unstable; urgency=high
- * New upstream version 1.10.1
- - Fix CVE-2020-12662: Unbound can be tricked into amplifying an incoming
- query into a large number of queries directed to a target.
- - Fix CVE-2020-12663: Malformed answers from upstream name servers can be
- used to make Unbound unresponsive.
+ * New upstream version 1.10.1
+ - Fix CVE-2020-12662: Unbound can be tricked into amplifying an incoming
+ query into a large number of queries directed to a target.
+ - Fix CVE-2020-12663: Malformed answers from upstream name servers can be
+ used to make Unbound unresponsive.
- -- Robert Edmonds Tue, 19 May 2020 11:36:53 -0400
+ -- Robert Edmonds Tue, 19 May 2020 11:36:53 -0400
unbound (1.10.0-1) unstable; urgency=medium
- [ Robert Edmonds ]
- * New upstre