$ zcat /usr/share/doc/djbdns/NEWS.Debian.gz |head
djbdns (1:1.05-6) unstable; urgency=medium

  CVE-2008-4392 reports 'Rapid DNS Poisoning in dnscache', the dnscache
  program included in djbdns-1.05.  Upstream's comments on this can be
  read in http://cr.yp.to/djbdns/forgery.html

  The dbndns package, the Debian fork of djbdns, includes a patch that
  limits concurrent outgoing SOA queries to 20 instead 200 (MAXUDP) to
  make birthday attacks more difficult.

$ zcat /usr/share/doc/djbdns/changelog.Debian.gz |head
djbdns (1:1.05-6) unstable; urgency=medium

  * dbndns/diff/0004-dnscache.c-allow-a-maximum-of-20-concurrent...diff:
    new; dnscache.c: allow a maximum of 20 concurrent outgoing SOA
    queries (#516394).
  * debian/djbdns.NEWS.Debian: talk about the patch 0004-dnscache.c...
    being applied to the dbndns package.
  * debian/dnscache-run.postinst: restart dnscache on package upgrade.
  * debian/dbndns.README.Debian: document that patches 0003-...diff,
    0004-...dif are applied to dbndns.
$ 




-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to