* SECURITY UPDATE: first issue is remotely exploitable, likely
leads to full compromise; second issue allows an attacker to
spoof domain data for domain names he does not own (LP: #502987)
- debian/patches/CVE-2009-4009-4010.dpatch: fixes the two
problems
- CVE-2009-4009, CVE-2009-4010
* Fixed init.d script typo which prevented the stop() function from
working (LP: #403957)
- debian/init.d/pdns-recursor
-- Imre Gergely <email address hidden> Thu, 07 Jan 2010 01:36:22 +0200
This bug was fixed in the package pdns-recursor - 3.1.7-2ubuntu0.1
---------------
pdns-recursor (3.1.7-2ubuntu0.1) jaunty-security; urgency=low
* SECURITY UPDATE: first issue is remotely exploitable, likely patches/ CVE-2009- 4009-4010. dpatch: fixes the two init.d/ pdns-recursor
leads to full compromise; second issue allows an attacker to
spoof domain data for domain names he does not own (LP: #502987)
- debian/
problems
- CVE-2009-4009, CVE-2009-4010
* Fixed init.d script typo which prevented the stop() function from
working (LP: #403957)
- debian/
-- Imre Gergely <email address hidden> Thu, 07 Jan 2010 01:36:22 +0200