Quoting Jakub Wilk (jw...@debian.org):
> * Salvatore Bonaccorso , 2016-08-12, 17:35:
> >mitigation could be used as per https://lwn.net/Articles/696868/ .
>
> This is behind paywall at the moment. The relevant part appears to be:
>
> >there is a mitigation available in the form of the
> >tcp_cha
Bonjour,
Je suis en congés du 08 au 19/08 inclus.
En mon absence merci de contacter le service web sur l'adresse
service...@viadom.fr.
Cordialement,
Guillaume Cyr
Le 12/08/2016 à 17:46, Jakub Wilk a écrit :
> * Salvatore Bonaccorso , 2016-08-12, 17:35:
>> mitigation could be used as per https://lwn.net/Articles/696868/ .
>
> This is behind paywall at the moment. The relevant part appears to be:
>
>> there is a mitigation available in the form of the
>> tcp
* Salvatore Bonaccorso , 2016-08-12, 17:35:
mitigation could be used as per https://lwn.net/Articles/696868/ .
This is behind paywall at the moment. The relevant part appears to be:
there is a mitigation available in the form of the
tcp_challenge_ack_limit sysctl knob. Setting that value to s
Hi Richard,
On Thu, Aug 11, 2016 at 02:41:29PM +0200, Richard van den Berg wrote:
> Dear Debian security team,
>
> Will there be a DSA written for CVE-2016-5696 [1]? It looks pretty serious
> and I'd like to fix this on my systems ASAP.
Yes there will be a Linux DSA including the fix for CVE-201
5 matches
Mail list logo