From mboxrd@z Thu Jan 1 00:00:00 1970 From: Michael Tremer To: development@lists.ipfire.org Subject: Re: Including patch for CVE-2020-25705 into upcoming Core Update 153? Date: Tue, 17 Nov 2020 11:05:31 +0000 Message-ID: <595BD7A1-C914-4D2F-9784-33BBFDE6C859@ipfire.org> In-Reply-To: <5e4a0b61-8aa6-0052-e468-5722d7a915c8@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============1068439811652862954==" List-Id: --===============1068439811652862954== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Hello, Yes, we should add this patch to the currently open next branch. Who will send a patch? Best, -Michael > On 16 Nov 2020, at 16:10, Peter M=C3=BCller wr= ote: >=20 > Hello *, >=20 > since Core Update 153 is already scheduled to come with a new kernel, inclu= ding this > patch against CVE-2020-25705 (dubbed "SADDNS" at the time of writing) into = it makes > sense IMHO: >=20 > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?= id=3Db38e7819cae946e2edf869e604af1e65a5d241c5 >=20 > Further reading is available at, for example, ZDNet: > https://www.zdnet.com/article/dns-cache-poisoning-poised-for-a-comeback-sad= -dns/ >=20 > Thanks, and best regards, > Peter M=C3=BCller --===============1068439811652862954==--