aboutsummaryrefslogtreecommitdiffstats
path: root/target/linux/generic/patches-4.1/096-tcp-make-challenge-acks-less-predictable.patch
Commit message (Collapse)AuthorAgeFilesLines
* kernel: update kernel 4.1 to version 4.1.34Stijn Tintel2016-10-241-76/+0
| | | | | | | | | | | | Refresh patches for all targets supporting 4.1 and not marked broken. Compile-tested on all targets using 4.1 and not marked broken. Changes to generic/610-netfilter_match_bypass_default_checks.patch based on 84d489f64f3b382d5544e342f66d8806e94e85d3. Changes to generic/666-Add-support-for-MAP-E-FMRs-mesh-mode.patch based on a90ee92337d60fd14b6431adcda9929b955f3408. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* kernel: backport upstream challenge ACK fix (CVE-2016-5696)Jo-Philipp Wich2016-08-131-0/+76
Yue Cao claims that current host rate limiting of challenge ACKS (RFC 5961) could leak enough information to allow a patient attacker to hijack TCP sessions. He will soon provide details in an academic paper. Backports upstream commit 75ff39ccc1bd5d3c455b6822ab09e533c551f758 to the used LEDE kernel versions. Signed-off-by: Jo-Philipp Wich <jo@mein.io>