On 04/14/2017 12:38 AM, Leo Gaspard wrote: According to [1], linux <= 4.4.60 is affected. The patch was but on 4.5-rc1 branch on Dec. 15, but this doesn't mean it got backported to older kernels as it was not tagged as a security issue before (eg. debian's DSA mentioned "A regression in the UDP implementation prevented freeradius and some other applications from receiving data." as the reason for their backporting the patch, if I read correctly)
Which, unless fedora's (or qubes') kernel has been using a patch for this despite it not being tagged as a security issue until now, would mean qubes' current kernels are all vulnerable. HTH, Leo ---- Ugh. If that's the case, then people should compile a 4.4.61 kernel for themselves (that was released on Apr 12 so it's the most recent in that branch) since Qubes builds its kernel off the vanilla kernel (it's pretty easy do and like I said before, it should build with no problems, but make sure you have 4GB of free space in /home before you do since the compilation needs that much to complete); not sure if/when that'll appear in the official Qubes repositories so until then, we're all on our own. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/ocpt9o%24fgg%241%40blaine.gmane.org. For more options, visit https://groups.google.com/d/optout.
