-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Two CVE numbers have been assigned to track the two parts of this: CVE-2015-5694 and CVE-2015-5695 https://security-tracker.debian.org/tracker/CVE-2015-5694 https://security-tracker.debian.org/tracker/CVE-2015-5695 Thanks, Kiall On 28/07/15 16:52, Kiall Mac Innes wrote: > Launchpad Number: 1471161 CVE: TBA Date: July 28, 2015 Title: > Designate mDNS DoS through incorrect handling of large RecordSets > Reporter: Florian Weimer (Red Hat) Products: Designate Versions: > 2015.1.0 through 1.0.0.0b1 > > Description: Florian Weimer from Red Hat reported a vulnerability > in Designate. By creating a single RecordSet that exceeds the > configured max allowed DNS packet size, an authenticated user may > cause the Designate mDNS service to enter an infinite loop, > triggering a DoS. > > Liberty (development branch) fix: > https://review.openstack.org/206578 > > Kilo fix: https://review.openstack.org/206580 > > Notes: This fix will be included in a future 1.0.0.0b2 release. > > References: https://launchpad.net/bugs/1471161 > > -- Kiall Mac Innes, OpenStack Designate PTL > > > > _______________________________________________ Mailing list: > http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack Post > to : openstack at lists.openstack.org Unsubscribe : > http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack > -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCAAGBQJVuNVuAAoJEHuWgzsGpgIa7usH/2DjTTK8wn+IRtBH9q6KwNFe GGzctVfU7YmiEfezj2vGN4hoTyt23y+B0ap7DQIoWUvseg38NG3zjY7zGdAn/X4F AJXn/xSz9bpQ3/g2ILkURfZIlHgE/KV4yPNpdETL/OSqOHyLPKK49yLm2fMUZRn7 SV9j7VQXUEywSm8uXf8DiWfnYvAQAuxK5o3r8iXhbqLTJvgjuiboNNFS2jgXZJxv /tAlJ9DsMqWpLXaLp1EleN35AoDl+imcqDBTU9KpuWa0BOqr5Ja6m19X/XnbNS9E uh0KFLNPd8K4cuxan1I0TKyjyf9WD/IPmHLML8vRa3xC27pLzTntoHoYJbWpqyk= =mJ+m -----END PGP SIGNATURE-----