Unbound 1.24.1 released
Petr Menšík
pemensik at redhat.com
Fri Oct 24 16:38:32 UTC 2025
Hi!
First things first, thank you for the great product.
However, my Fedora package has failed again on PGP key verification. New
release is signed with key 948EB42322C5D00B79340F5DCFF3344D9087A490.
My previous key of Wouter were not recognized. Then I realized previous
release were not signed by Yorgos. But some previous were. I went to
NLNetlabs People page [1] to find who that george might be. And
surprise, no George at all.
When I refreshed the key of Yorgos, I found then I am not under attack
and I already have such key, but not with this id.
gpgv: Signature made Wed Oct 22 11:16:18 2025 CEST
gpgv: using RSA key 948EB42322C5D00B79340F5DCFF3344D9087A490
gpgv: issuer "george at nlnetlabs.nl"
gpgv: Can't check signature: No public key
Anyway, could be please created one file published over HTTPS, which
would contain both people creating source archives recently?
I had to put one key or another key [2] into my spec file, it is somehow
unwanted, especially in archive signature verification.
It would be better if unbound page [3] could contain at least
description which people may sign the release. Ideally combined single
file, which I may refresh on new release if in doubt.
Thank you in advance!
1. https://nlnetlabs.nl/people/
2.
https://src.fedoraproject.org/rpms/unbound/blob/rawhide/f/unbound.spec#_222
3. https://nlnetlabs.nl/projects/unbound/about/
On 22/10/2025 12:20, Yorgos Thessalonikefs via Unbound-users wrote:
> Hi,
>
> Unbound 1.24.1 is available:
> https://nlnetlabs.nl/downloads/unbound/unbound-1.24.1.tar.gz
> sha256 7f2b1633e239409619ae0527f67878b0f33ae0ec0ee5a3a51c042c359ba1eeab
> pgp https://nlnetlabs.nl/downloads/unbound/unbound-1.24.1.tar.gz.asc
>
> This security release fixes CVE-2025-11411.
>
> Promiscuous NS RRSets that complement DNS replies in the authority
> section can be used to trick resolvers to update their delegation
> information for the zone.
>
> The CVE is described here
> https://nlnetlabs.nl/downloads/unbound/CVE-2025-11411.txt
>
> We would like to thank Yuxiao Wu, Yunyi Zhang, Baojun Liu and Haixin
> Duan from Tsinghua University for discovering and responsibly disclosing
> the vulnerability.
>
> Bug Fixes:
> - Fix CVE-2025-11411 (possible domain hijacking attack), reported by
> Yuxiao Wu, Yunyi Zhang, Baojun Liu and Haixin Duan from Tsinghua
> University.
>
>
> This Unbound release is signed by my PGP key.
>
> You can find my public PGP key at https://nlnetlabs.nl/people/.
>
> Also on the online key servers like
> https://keyserver.ubuntu.com/pks/lookup?search=948eb42322c5d00b79340f5dcff3344d9087a490&fingerprint=on&op=index
>
> which is additionally signed with Wouter's key as well.
>
> Both Wouter's (PGP Key ID: 9F6F 1C2D 7E04 5F8D)
> and my key (PGP Key ID: CFF3 344D 9087 A490)
> will be eligible for signing releases from now.
>
>
> Best regards,
> -- Yorgos
>
--
Petr Menšík
Senior Software Engineer, RHEL
Red Hat, https://www.redhat.com/
PGP: DFCF908DB7C87E8E529925BC4931CA5B6C9FC5CB
More information about the Unbound-users
mailing list