SUSE Security Announcement 2009:059: bind

   The bind DNS server was updated to close a possible cache poisoning    vulnerability which allowed to bypass DNSSEC.     This problem can only happen after the other spoofing/poisoning    mechanisms have been bypassed already (the port and transaction id    randomization). Also this can only happen if the server is setup for 

DNSSEC. Due to this limitation we consider this a minor issue...

Read More



Subscribe to Comments Feed

Who we are ?

The Linux Foundation is a non-profit consortium dedicated to the growth of Linux.

More About the foundation...

Frequent Questions

Join / Linux Training / Board