Hello,
On 02/13/2014 08:30 PM, coldtobi wrote:
Source: djbdns
Followup-For: Bug #516394
Hi,
regarding this bug: It seems that the the German Chaos Computer Clubs' DNS
got be owned due to this bug. [1]
no. It is not debians fault when users do not install security updates.
hth
--
Source: djbdns
Followup-For: Bug #516394
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
regarding this bug: It seems that the the German Chaos Computer Clubs' DNS got
be owned due to this bug. [1]
It might be argueable if DNS is generally broken or not, but according [2] and
the fact
On Thu, Oct 01, 2009 at 10:28:35PM +0200, Luk Claes wrote:
Any reason why there was no upload for this security issue to unstable yet?
Hi, I made my position as the maintainer of the package clear in
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=516394#36
and some private discussions with
Gerrit Pape wrote:
On Thu, Oct 01, 2009 at 10:28:35PM +0200, Luk Claes wrote:
Any reason why there was no upload for this security issue to unstable yet?
Hi, I made my position as the maintainer of the package clear in
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=516394#36
and some
* Luk Claes:
Gerrit Pape wrote:
On Thu, Oct 01, 2009 at 10:28:35PM +0200, Luk Claes wrote:
Any reason why there was no upload for this security issue to unstable yet?
Hi, I made my position as the maintainer of the package clear in
Florian Weimer wrote:
* Luk Claes:
Gerrit Pape wrote:
On Thu, Oct 01, 2009 at 10:28:35PM +0200, Luk Claes wrote:
Any reason why there was no upload for this security issue to unstable yet?
Hi, I made my position as the maintainer of the package clear in
* Florian Weimer:
* Luk Claes:
Gerrit Pape wrote:
On Thu, Oct 01, 2009 at 10:28:35PM +0200, Luk Claes wrote:
Any reason why there was no upload for this security issue to unstable yet?
Hi, I made my position as the maintainer of the package clear in
Hi
Any reason why there was no upload for this security issue to unstable yet?
Cheers
Luk
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
$ zcat /usr/share/doc/djbdns/NEWS.Debian.gz |head
djbdns (1:1.05-6) unstable; urgency=medium
CVE-2008-4392 reports 'Rapid DNS Poisoning in dnscache', the dnscache
program included in djbdns-1.05. Upstream's comments on this can be
read in http://cr.yp.to/djbdns/forgery.html
The dbndns
Processing commands for cont...@bugs.debian.org:
tags 516394 - patch
Bug#516394: [security]: Rapid DNS Poisoning in dnscache
Tags were: patch security
Tags removed: patch
quit
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system administrator
tags 516394 - patch
quit
On Sat, Feb 21, 2009 at 04:20:14PM +0900, Hideki Yamane (Debian-JP) wrote:
I've found an article about DNS Cache poisoing for dnscache,
and patch is available at his site, see http://www.your.org/dnscache/
patches are freely distributed, so we can apply those.
Package: djbdns
Severity: critical
Tags: security patch
Justification: breaks the whole system
Hi,
I've found an article about DNS Cache poisoing for dnscache,
and patch is available at his site, see http://www.your.org/dnscache/
patches are freely distributed, so we can apply those.
It was
12 matches
Mail list logo