From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from full.lackof.org (full.lackof.org [204.13.164.203]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id C82423B29D for ; Thu, 13 Oct 2022 12:59:55 -0400 (EDT) Received: from [172.16.1.4] (97-126-23-70.tukw.qwest.net [97.126.23.70]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (Client did not present a certificate) by full.lackof.org (Postfix) with ESMTPSA id 4MpG3H504Gzyj9 for ; Thu, 13 Oct 2022 16:59:55 +0000 (UTC) Message-ID: Date: Thu, 13 Oct 2022 09:59:54 -0700 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.12.0 Content-Language: en-US To: cerowrt-devel From: Matt Taggart Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Subject: [Cerowrt-devel] OTA exploitable wifi bugs X-BeenThere: cerowrt-devel@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: Development issues regarding the cerowrt test router project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 13 Oct 2022 16:59:55 -0000 https://www.openwall.com/lists/oss-security/2022/10/13/2 Presumably openwrt and other router firmwares (FOSS and proprietary) will be effected? Also android and maybe TVs, etc? That's a whole lot of devices. Lots of updating in our futures... maybe this will help get newer SQM rolled out more (but maybe not enabled by default). Sorry, this is probably my fault, I just updated a bunch of stuff last night (after I washed my car causing it to rain). -- Matt Taggart matt@lackof.org