|
From: Heiko Z. <he...@zu...> - 2014-10-10 12:57:50
|
Cameron, The version in the testing folder has the fix included, in addition to the shell shock patches: ftp://ftp.devil-linux.org/pub/devel/testing This is pretty much the same as the official 1.6.6 will be, except one bash patch is missing. Once my nightly build works again, I'll upload that one also. Heiko Quoting cdmiller <cdm...@ad...>: > Does this bug exist in the current release of Devil Linux kernel? > > Same as mentioned here: > http://lists.openwall.net/netdev/2014/06/10/108 > > and here: > https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1337281 > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754173 > > Reason I ask is we saw similar behavior (extreme slow down) recently on > outbound traffic for a NAT interface we set up on our Devil-Linux firewall. > > This was on Devil-Linux 1.6.2-i686 with 3.2.26-grsec. > > Thanks, > > - cameron > > > ------------------------------------------------------------------------------ > Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer > Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports > Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper > Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer > http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk > _______________________________________________ > Devil-linux-discuss mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss -- Regards Heiko Zuerker |