This bug was fixed in the package pdns-recursor - 3.1.7-2ubuntu0.1 --------------- pdns-recursor (3.1.7-2ubuntu0.1) jaunty-security; urgency=low
* SECURITY UPDATE: first issue is remotely exploitable, likely leads to full compromise; second issue allows an attacker to spoof domain data for domain names he does not own (LP: #502987) - debian/patches/CVE-2009-4009-4010.dpatch: fixes the two problems - CVE-2009-4009, CVE-2009-4010 * Fixed init.d script typo which prevented the stop() function from working (LP: #403957) - debian/init.d/pdns-recursor -- Imre Gergely <gi...@narancs.net> Thu, 07 Jan 2010 01:36:22 +0200 ** Changed in: pdns-recursor (Ubuntu Jaunty) Status: New => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2009-4009 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2009-4010 -- Variable mismatch in /etc/init.d/pdns-recursor https://bugs.launchpad.net/bugs/403957 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs