You are not logged in.
I just read about the current TCP DOS vulnerability in current Linux kernels.
Are the current Arch kernels linux and linux-lts affected by this?
The CVE is not listed here.
Found it: https://security.archlinux.org/AVG-747
Sorry for the noise.
Last edited by schard (2018-08-07 13:42:30)
macro_rules! yolo { { $($tokens:tt)* } => { unsafe { $($tokens)* } }; }
Offline
It is [listed on the linked page], just under the AVG-747 identity. See also: https://security.archlinux.org/CVE-2018-5390
EDIT: clarification.
Last edited by WorMzy (2018-08-07 13:50:22)
Sakura:-
Mobo: MSI MAG X570S TORPEDO MAX // Processor: AMD Ryzen 9 5950X @4.9GHz // GFX: AMD Radeon RX 5700 XT // RAM: 32GB (4x 8GB) Corsair DDR4 (@ 3000MHz) // Storage: 1x 3TB HDD, 6x 1TB SSD, 2x 120GB SSD, 1x 275GB M2 SSD
Making lemonade from lemons since 2015.
Online
It is
It is? Doesn't the table in the page you linked to say it was fixed in 4.17.11-1? The current repo version is 4.17.12. So it should not be vulnerable.
"UNIX is simple and coherent..." - Dennis Ritchie, "GNU's Not UNIX" - Richard Stallman
Offline
Sorry, that was a bad choice of words/lack of context on my part; that was a response to "The CVE is not listed here.", but it looks like OP found it on their own.
Sakura:-
Mobo: MSI MAG X570S TORPEDO MAX // Processor: AMD Ryzen 9 5950X @4.9GHz // GFX: AMD Radeon RX 5700 XT // RAM: 32GB (4x 8GB) Corsair DDR4 (@ 3000MHz) // Storage: 1x 3TB HDD, 6x 1TB SSD, 2x 120GB SSD, 1x 275GB M2 SSD
Making lemonade from lemons since 2015.
Online