Please sync pdnsd 1.2.6-par-11 from Debian Unstable (Main)

Bug #284763 reported by Scott Kitterman
256
Affects Status Importance Assigned to Milestone
pdnsd (Ubuntu)
Fix Released
High
Unassigned

Bug Description

Binary package hint: pdnsd

Provides appropriate work around for DNS cache poisoning attack (source port randomization)

pdnsd (1.2.6-par-11) unstable; urgency=high

  * Follow-up for CVE-2008-1447: activate port-randomization, do not trust the
    kernel for it (Closes: #502275).

 -- Pierre Habouzit <email address hidden> Wed, 15 Oct 2008 10:02:52 +0200

CVE References

Changed in pdnsd:
importance: Undecided → High
milestone: none → ubuntu-8.10
status: New → Confirmed
Revision history for this message
Steve Langasek (vorlon) wrote :

[Updating] pdnsd (1.2.6-par-10 [Ubuntu] < 1.2.6-par-11 [Debian])
 * Trying to add pdnsd...
  - <pdnsd_1.2.6-par-11.diff.gz: downloading from http://ftp.debian.org/debian/>
  - <pdnsd_1.2.6-par.orig.tar.gz: already in distro - downloading from librarian>
  - <pdnsd_1.2.6-par-11.dsc: downloading from http://ftp.debian.org/debian/>
I: pdnsd [universe] -> pdnsd_1.2.6-par-10 [universe].

Changed in pdnsd:
milestone: ubuntu-8.10 → none
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.