Debian GNU/Linux Information for VU#800113

Multiple DNS implementations vulnerable to cache poisoning



Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References



The Debian Security Team has published Debian Security Advisories DSA-1603, DSA-1604, and DSA-1605 in response to this issue. Users are encouraged to review these advisories and apply the corresponding updates or upgrade their versions of BIND, as appropriate.

If you have feedback, comments, or additional information about this vulnerability, please send us email.