Hello Scott,

* 2008-09-17 17:18, Scott Kitterman wrote:
> Also in Sid/Lenny.  It looks like there were buffer packing implications in 
> the security fix that neither upstream nor myself appreciated when we wrote 
> it.  The security fix had two parts:  source port randomization and 
> transaction ID randomization.  If instead of reverted to the package that has 
> neither, you change 'self.tid' to '0' in line 199 
> of /var/lib/python-support/python2.4/DNS/Base.py you will work around this 
> problem and still have source port randomization.
> 
>   I've contacted upstream and will get this sorted out.

Thanks for your answer, I'm cc'ing the security team to bring to their
attention the bug report: we'll have to issue a new security update with
the fix.

Best regards,

-- 
Fabio Tranchitella                         http://www.kobold.it
Free Software Developer and Consultant     http://www.tranchitella.it
_____________________________________________________________________
1024D/7F961564, fpr 5465 6E69 E559 6466 BF3D 9F01 2BF8 EE2B 7F96 1564



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to