Skip to content

Conversation

@GoetzGoerisch
Copy link
Contributor

📦 Package Details

Maintainer: @EricLuehrsen

Description:
Fixes: Possible Domain Hijacking via promiscuous NS Records (CVE-2025-11411)
Latest upstream NLnetLabs/unbound@f6269ba


🧪 Run Testing Details

  • OpenWrt Version: SNAPSHOT
  • OpenWrt Target/Subtarget: x86/64
  • OpenWrt Device: x86/64

✅ Formalities

  • I have reviewed the CONTRIBUTING.md file for detailed contributing guidelines.

If your PR contains a patch:

  • It can be applied using git am
  • It has been refreshed to avoid offsets, fuzzes, etc., using
    make package/<your-package>/refresh V=s
  • It is structured in a way that it is potentially upstreamable
    (e.g., subject line, commit description, etc.)
    We must try to upstream patches to reduce maintenance burden.

@GoetzGoerisch GoetzGoerisch marked this pull request as ready for review December 6, 2025 11:54
@GoetzGoerisch
Copy link
Contributor Author

@GeorgeSapkin needs the formality check an update here as well?

openwrt/openwrt@9f6c16e

@GeorgeSapkin
Copy link
Member

@GeorgeSapkin needs the formality check an update here as well?

There's an issue with permissions when posting formality check comments. The solution is being discussed here:

Fixes: Possible Domain Hijacking via promiscuous NS Records (CVE-2025-11411)
Changelog: https://www.nlnetlabs.nl/projects/unbound/download/#unbound-1-24-2
Upstream commit f6269baa605d31859f28770e01a24e3677e5f82c
NLnetLabs/unbound@f6269ba

Signed-off-by: Goetz Goerisch <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants