[Bug 284763] [NEW] Please sync pdnsd 1.2.6-par-11 from Debian Unstable (Main)

Scott Kitterman ubuntu at kitterman.com
Fri Oct 17 04:58:57 BST 2008


*** This bug is a security vulnerability ***

Public security bug reported:

Binary package hint: pdnsd

Provides appropriate work around for DNS cache poisoning attack (source
port randomization)

pdnsd (1.2.6-par-11) unstable; urgency=high

  * Follow-up for CVE-2008-1447: activate port-randomization, do not trust the
    kernel for it (Closes: #502275).

 -- Pierre Habouzit <madcoder at debian.org>  Wed, 15 Oct 2008 10:02:52
+0200

** Affects: pdnsd (Ubuntu)
     Importance: High
         Status: Confirmed

** Visibility changed to: Public

** Changed in: pdnsd (Ubuntu)
   Importance: Undecided => High
       Status: New => Confirmed
       Target: None => ubuntu-8.10

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-1447

-- 
Please sync pdnsd 1.2.6-par-11 from Debian Unstable (Main)
https://bugs.launchpad.net/bugs/284763
You received this bug notification because you are a member of Ubuntu
Package Archive Administrators, which is a direct subscriber.



More information about the ubuntu-archive mailing list