Good to know! Thanks!!
Jeff On Tuesday, August 7, 2018 at 9:14:46 AM UTC-5, RobertCNelson wrote: > > On Tue, Aug 7, 2018 at 8:50 AM Jeff Andich <[email protected] > <javascript:>> wrote: > > > > Hello, > > > > We got an email at work about the following advisories about a denial of > service vulnerability in the TCP implementation in kernel versions 4.9 and > greater: > > > > https://www.kb.cert.org/vuls/id/962459. > > > > There's a patch, called out in the above link, and the patch comments > describe the issue and the current fix: > > > > > https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/patch/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e > > > > > If we're running kernel version 4.9 or greater on our > beaglebone/beagleboard products, what do you recommend we do? > > > > Should we go ahead and apply the patch to every image we download from > beagleboard.org with kernel 4.9 or greater if we're connecting our > beagles on the internet and are concerned about the attack, or has the fix > already be "rolled" into certain images? > > Already included in: > > 4.17.11 > > > https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v4.17.11&id=db11182a1e38e7149804962111622b15bd9aeff2 > > > 4.14.59 > > > https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v4.14.59&id=f3a5ba6310e11df370f6888ed716d1486896d983 > > > Our update script already pulls in: > > http://repos.rcn-ee.net/latest/stretch-armhf/LATEST-ti > > ABI:1 LTS414 4.14.60-ti-r67 > > and > > http://repos.rcn-ee.net/latest/stretch-armhf/LATEST-armv7 > > ABI:1 LTS414 4.14.60-armv7-x5 > ABI:1 STABLE 4.17.12-armv7-x12 > > http://repos.rcn-ee.net/latest/stretch-armhf/LATEST-armv7-lpae > > ABI:1 LTS414 4.14.60-armv7-lpae-x3 > ABI:1 STABLE 4.17.12-armv7-lpae-x12 > > Regards, > > -- > Robert Nelson > https://rcn-ee.com/ > -- For more options, visit http://beagleboard.org/discuss --- You received this message because you are subscribed to the Google Groups "BeagleBoard" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/beagleboard/ec6846d4-ec1a-4d40-bb53-aca92417dcae%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
