aboutsummaryrefslogtreecommitdiffstats
path: root/target/linux/generic/patches-3.18/901-debloat_sock_diag.patch
diff options
context:
space:
mode:
authorJo-Philipp Wich <jo@mein.io>2016-08-13 15:17:42 +0200
committerJo-Philipp Wich <jo@mein.io>2016-08-13 16:23:23 +0200
commit3c2c31bb66e5b247ffbb3cafac2a21d441daef39 (patch)
tree2edd869c7011775fa3f8cd6ecb93a075b95ae38c /target/linux/generic/patches-3.18/901-debloat_sock_diag.patch
parentcf8da98e947056848431502b03d006ee80b5f930 (diff)
downloadupstream-3c2c31bb66e5b247ffbb3cafac2a21d441daef39.tar.gz
upstream-3c2c31bb66e5b247ffbb3cafac2a21d441daef39.tar.bz2
upstream-3c2c31bb66e5b247ffbb3cafac2a21d441daef39.zip
kernel: backport upstream challenge ACK fix (CVE-2016-5696)
Yue Cao claims that current host rate limiting of challenge ACKS (RFC 5961) could leak enough information to allow a patient attacker to hijack TCP sessions. He will soon provide details in an academic paper. Backports upstream commit 75ff39ccc1bd5d3c455b6822ab09e533c551f758 to the used LEDE kernel versions. Signed-off-by: Jo-Philipp Wich <jo@mein.io>
Diffstat (limited to 'target/linux/generic/patches-3.18/901-debloat_sock_diag.patch')
0 files changed, 0 insertions, 0 deletions