[arch-security] CVE-2014-507
26 Jul
2014
26 Jul
'14
3:08 a.m.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 To All, It has been mentioned on OSS-security that there's a null pointer dereference flaw in the Stream Control Transmission Protocol in the Linux kernel. Currently Arch Linux builds this option as a module. I've already filed a bug report at : <https://bugs.archlinux.org/task/41346> Regards, Mark -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iF4EAREIAAYFAlPTG7MACgkQZ/Z80n6+J/Y0kgEAgNUyMioU8wmch3jTdiDegjVU G2+1JljcQ/TnvnOZFCABAIUehzWBDhpJ2vsX3VSjGQgwRQEpXsJHgfulKNYrjhqT =ziEQ -----END PGP SIGNATURE-----
3810
Age (days ago)
3810
Last active (days ago)
0 comments
1 participants
participants (1)
-
Mark Lee