Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 11 Nov 2016 08:24:33 -0500 (EST)
From: Vladis Dronov <vdronov@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2016-8645: linux kernel: net: a BUG() statement can be hit
 in net/ipv4/tcp_input.c

Hello,

> I'm not aware of any fix as of now.

Actiually, not. There is a patch being developed now, thanks, Eric:

http://marc.info/?l=linux-netdev&m=147881188232264&w=2

http://marc.info/?t=147881111500001&r=1&w=2&n=2 # the whole thread

http://marc.info/?l=linux-netdev&m=147881236332369&w=2 # patch v2

http://www.spinics.net/lists/netdev/msg403787.html

http://www.spinics.net/lists/netdev/msg403789.html # patch v2

Best regards,
Vladis Dronov | Red Hat, Inc. | Product Security Engineer

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ