[Git][security-tracker-team/security-tracker][master] Mark CVE-2008-1447/dnspython as fixed by 1.7.1-1

Santiago R.R. (@santiago) santiago at debian.org
Fri Oct 25 14:58:17 BST 2024



Santiago R.R. pushed to branch master at Debian Security Tracker / security-tracker


Commits:
30affd44 by Santiago Ruano Rincón at 2024-10-25T10:58:06-03:00
Mark CVE-2008-1447/dnspython as fixed by 1.7.1-1

This was confirmed by uptream: https://bugs.debian.org/492465#42.
Version 1.7 introduced an entropy pool that enhanced the query ID
randonmess.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -715021,7 +715021,7 @@ CVE-2008-1447 (The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0
 	- refpolicy 2:0.0.20080702-1
 	- pdnsd 1.2.6-par-11 (bug #502275)
 	- python-dns 2.3.1-5 (low; bug #490217)
-	- dnspython <unfixed> (unimportant; bug #492465)
+	- dnspython 1.7.1-1 (unimportant; bug #492465)
 	NOTE: Just a stub resolver Linux kernel provides source port randomisation
 	- adns 1.4-2 (unimportant; bug #492698)
 	NOTE: adns is not suitable to use with untrusted responses, documented in README.Debian



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/30affd44eec524268b64ee23355a63af53248a89

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/30affd44eec524268b64ee23355a63af53248a89
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241025/389036f5/attachment.htm>


More information about the debian-security-tracker-commits mailing list