tags 492700 found 492700 0.59 fixed 492700 0.60 thanks
Hello! Trying with a summary. The source port randomization was introduced with 0.60 by setting the source port to zero. This works will with kernels in etch-n-half and better, I am marking this bug with found/fixed accordingly. As Net::DNS is a stub resolver the security team tagged this as a low priority task. http://security-tracker.debian.org/tracker/CVE-2008-1447 No backport to etch was done. I discussed a fix which does not rely on this specific behaviour of the kernel with upstream of Net::DNS back then. Result: This would need some effort which should be put into the underlying socket modules if at all. I deem this issue as done, the bug will remain open to document the impact on etch installations. Regards Florian -- Florian Hinzmann private: f.hinzm...@hamburg.de Debian: f...@debian.org PGP Key / ID: 1024D/B4071A65 Fingerprint : F9AB 00C1 3E3A 8125 DD3F DF1C DF79 A374 B407 1A65 -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org