Description of problem: Use incoming network tuple as seed for NAT port randomization. This avoids concerns of leaking net_random() bits, and also gives better port distribution.
Proposed upstream patch: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=9f593653742d1dd816c4e94c6e5154a57ccba6d1
Created attachment 314889 [details] Upstream patch for this issue
Created attachment 316250 [details] Patch for MRG 2.6.24.7-79 Queued for -79
Verified that the "Patch for MRG 2.6.24.7-79" (https://bugzilla.redhat.com/attachment.cgi?id=316250) is added in the mrg-rt-2.6.24.7-81 source tree. mrg-rt.git commit 256fe604b0cec4145abe5d7ebacb92fef8709b5a
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2008-0857.html