Changelog for
perl-net-dns-0.48-8tr.i586.rpm :
Fri Jul 27 14:00:00 2007 Nived Gopalan
0.48-8tr
- SECURITY Fix: An error exists in the handling of DNS queries
where IDs are incremented with a fixed value and are additionally
used for child processes in a forking server. This can be exploited
to poison the DNS cache of an application using the module if a
valid ID is guessed.
- An error in the PP implementation within the \"dn_expand()\" function
can be exploited to cause a stack overflow due to an endless loop
via a specially crafted DNS packet.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2007-3377 and CVE-2007-3409 to
these issues.
Mon Jun 6 14:00:00 2005 Ajith Thampi 0.48-7tr
- Rebuilt on perl-5.8.7
Fri Mar 18 13:00:00 2005 Hasher Jamaludeen
- Rebuilt
Fri Mar 11 13:00:00 2005 Hasher Jamaludeen
- Removed unexpected exit
Mon Aug 23 14:00:00 2004 Nageswara Sastry
- Upgraded to version 0.48
Mon Mar 8 13:00:00 2004 Chr. Toldnes
- Rebuilt for TSL 2.1
Wed Jan 28 13:00:00 2004 Erlend Midttun 0.45-1em
- Initial release.