I am going to mark this as Invalid. Bind9 in Ubuntu 6.06 LTS is fully
patched based on upstream and known vulnerabilities. Please reopen if
this is found to be in error along with information on how to reproduce
the poisoning. Thanks!
** Changed in: bind9 (Ubuntu)
Status: Incomplete => Inva
> When investigating the issue we noticed there was an updated version of
> ISC DNS Bind that was not incorporated into the most recent Ubuntu 6.06
> DNS Bind package.
If you mean bind 9.4.2, that is in 8.04/hardy. However any security
fixes that are found in 9.4.2 should have also been incorpora
Sorry it took so long to get back to you.
I will have to dig up version numbers. But basically we had machines
with the most recent Ubuntu 6.06 DNS/Bind package running. And they
were poisoned. The machines were not breached, the systems were fine,
just DNS/Bind were filled with incorrect DNS
Thanks for the report. The bind9 in dapper should contain all security
fixes from later releases. Do you have any other details about the
situation you've been seeing?
** Changed in: bind9 (Ubuntu)
Status: Triaged => Incomplete
--
dns caches posioned
https://bugs.launchpad.net/bugs/1769
** Changed in: bind9 (Ubuntu)
Importance: Undecided => Wishlist
Status: New => Triaged
--
dns caches posioned
https://bugs.launchpad.net/bugs/176971
You received this bug notification because you are a member of Ubuntu
Bugs, which is a direct subscriber.
--
ubuntu-bugs mailing list
ub
** Visibility changed to: Public
--
dns caches posioned
https://bugs.launchpad.net/bugs/176971
You received this bug notification because you are a member of Ubuntu
Bugs, which is a direct subscriber.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/list