[Git][security-tracker-team/security-tracker][master] Mark CVE-2008-1447/dnspython as fixed by 1.7.1-1
Santiago R.R. (@santiago)
santiago at debian.org
Fri Oct 25 14:58:17 BST 2024
Santiago R.R. pushed to branch master at Debian Security Tracker / security-tracker
Commits:
30affd44 by Santiago Ruano Rincón at 2024-10-25T10:58:06-03:00
Mark CVE-2008-1447/dnspython as fixed by 1.7.1-1
This was confirmed by uptream: https://bugs.debian.org/492465#42.
Version 1.7 introduced an entropy pool that enhanced the query ID
randonmess.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -715021,7 +715021,7 @@ CVE-2008-1447 (The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0
- refpolicy 2:0.0.20080702-1
- pdnsd 1.2.6-par-11 (bug #502275)
- python-dns 2.3.1-5 (low; bug #490217)
- - dnspython <unfixed> (unimportant; bug #492465)
+ - dnspython 1.7.1-1 (unimportant; bug #492465)
NOTE: Just a stub resolver Linux kernel provides source port randomisation
- adns 1.4-2 (unimportant; bug #492698)
NOTE: adns is not suitable to use with untrusted responses, documented in README.Debian
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/30affd44eec524268b64ee23355a63af53248a89
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/30affd44eec524268b64ee23355a63af53248a89
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241025/389036f5/attachment.htm>
More information about the debian-security-tracker-commits
mailing list