You are not logged in.
Pages: 1
Just to mention I had the same problem with the beowulf amd64 netinstall iso.
No, that was Dirty Cow, and the fix contained a vulnerability in case Transparent Huge Pages were enabled, therefore the "Huge Dirty Cow".
Is Jessie's kernel vulnerable for Huge Dirty Cow?
It looks as if we're not using Transparent Huge Pages.
# cat /proc/meminfo | grep -i huge
returns nothing.
But, in case I'm mistaken: https://github.com/torvalds/linux/commi … 0b5740b1f0
Kind regards,
Gerard
Thanks FSR. After changing my sources.list to use pkgmaster.devuan.org, I got the fixed wpasupplicant.
wpa (2:2.4-1+deb9u1) stretch-security; urgency=high
* Non-maintainer upload by the Security Team.
* Fix multiple issues in WPA protocol (CVE-2017-13077, CVE-2017-13078,
CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082,
CVE-2017-13086, CVE-2017-13087, CVE-2017-13088):
My bad, I'm hooked on Ascii.
Is anyone working on securing wpa_supplicant against Krack?
Thanks,
Gerard
Pages: 1