tags 492700
found 492700 0.59
fixed 492700 0.60
thanks

Hello!

Trying with a summary.

The source port randomization was introduced with 0.60 by 
setting the source port to zero. This works will with kernels 
in etch-n-half and better, I am marking this bug with 
found/fixed accordingly.

As Net::DNS is a stub resolver the security team tagged 
this as a low priority task.
http://security-tracker.debian.org/tracker/CVE-2008-1447
No backport to etch was done.


I discussed a fix which does not rely on this specific behaviour of
the kernel with upstream of Net::DNS back then. Result: This would
need some effort which should be put into the underlying socket
modules if at all.


I deem this issue as done, the bug will remain open to document
the impact on etch installations.


 Regards
  Florian


-- 
  Florian Hinzmann                private: f.hinzm...@hamburg.de
                                   Debian: f...@debian.org
PGP Key / ID: 1024D/B4071A65
Fingerprint : F9AB 00C1 3E3A 8125 DD3F  DF1C DF79 A374 B407 1A65



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to