Package: python-dns Version: 2.3.1-6 Severity: important -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Both my patch (2.3.1-6 in Lenny) and upstream's (2.3.2-1) in Sid for CVE-2008-1447 managed to break DNS queries over TCP. This is fixed in a new upstream release (2.3.3). TCP queries are essential for python-spf (one of the packaged rdepends) due to some domains (such as aol.com) publishing SPF records that require TCP fallback. - -- System Information: Debian Release: lenny/sid APT prefers hardy-updates APT policy: (500, 'hardy-updates'), (500, 'hardy-security'), (500, 'hardy') Architecture: i386 (i686) Kernel: Linux 2.6.24-19-generic (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages python-dns depends on: ii python 2.5.2-0ubuntu1 An interactive high-level object-o ii python-central 0.6.7ubuntu0.1 register and build utility for Pyt python-dns recommends no packages. - -- no debconf information -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFIlOCMHajaM93NaGoRAob6AJ9EEw+WuaETszc1vkFpS+QxCw80bgCgjpWP iJb8USexCFAM9k8xv2StgFo= =5EEq -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]