Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 09 Aug 2018 07:12:27 +0000
From: Stiepan <stie@....swiss>
To: oss-security@...ts.openwall.com
Cc: ProtonMail Security Team <security@...tonmail.ch>, "xiaoya.yang" <xiaoya.yang@....int>
Subject: Re: Linux TCP implementation vulnerable to Denial of Service (CVE 2018-5390)

Hi,

Could you please provide some more details on the issue? About the same period, our secure e-mail provider suffered an unprecedented DDoS with some e-mail messages never reaching us.
Since this has business impact, we consider legal action against the opaque Linux-distros vulnerability-disclosure-among-friends-for-fun-and-profit scheme, that we exposed at the ITU earlier this year. This is digital divide in the works, with real impact for non-club-members.

Regards,
Stiepan A. Kovac
President
itk AVtobvS SARL

Envoyé depuis ProtonMail mobile

-------- Message d'origine --------
On 8 août 2018 à 17:44, Matthew Garrett a écrit :

> CVE 2018-5390 is a remotely exploitable denial of service against Linux
> systems. It was patched in the public kernel tree on the 2018-07-23 and
> publicly disclosed on 2018-08-06. A public tweet linking to the commit was
> made on 2018-07-23, so awareness of the issue may have been high before
> official disclosure. All Linux distributions should now have released
> patches for the affected releases.

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.