[Bug 284763] [NEW] Please sync pdnsd 1.2.6-par-11 from Debian Unstable (Main)
Scott Kitterman
ubuntu at kitterman.com
Fri Oct 17 04:58:57 BST 2008
*** This bug is a security vulnerability ***
Public security bug reported:
Binary package hint: pdnsd
Provides appropriate work around for DNS cache poisoning attack (source
port randomization)
pdnsd (1.2.6-par-11) unstable; urgency=high
* Follow-up for CVE-2008-1447: activate port-randomization, do not trust the
kernel for it (Closes: #502275).
-- Pierre Habouzit <madcoder at debian.org> Wed, 15 Oct 2008 10:02:52
+0200
** Affects: pdnsd (Ubuntu)
Importance: High
Status: Confirmed
** Visibility changed to: Public
** Changed in: pdnsd (Ubuntu)
Importance: Undecided => High
Status: New => Confirmed
Target: None => ubuntu-8.10
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-1447
--
Please sync pdnsd 1.2.6-par-11 from Debian Unstable (Main)
https://bugs.launchpad.net/bugs/284763
You received this bug notification because you are a member of Ubuntu
Package Archive Administrators, which is a direct subscriber.
More information about the ubuntu-archive
mailing list