summaryrefslogtreecommitdiffstats
path: root/recipes-kernel/linux/enea-common.inc
diff options
context:
space:
mode:
authorSona Sarmadi <sona.sarmadi@enea.com>2016-08-30 13:52:49 +0200
committerMartin Borg <martin.borg@enea.com>2016-08-30 15:58:53 +0200
commitbac630923de2f10b62e8f2635f192b7fec8165ba (patch)
tree4c6bc5c8f26ac0dcec3bcf1219bea14c3393b6a4 /recipes-kernel/linux/enea-common.inc
parent40894e99a839ce0e337bb3a7b83327bd64417d56 (diff)
downloadmeta-enea-bsp-common-bac630923de2f10b62e8f2635f192b7fec8165ba.tar.gz
kernel-net: CVE-2016-5696
tcp: make challenge acks less predictable net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack. References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696 https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/ patch/?id=5413f1a526d2d51d7a5768133c90936c017165c6 https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/ patch/?id=72c2d3bccaba4a0a4de354f9d2d24eccd05bfccf (This a follow-up to "tcp: make challenge acks less predictable) Signen-off-by: Sona Sarmadi <sona.sarmadi@enea.com> Signed-off-by: Martin Borg <martin.borg@enea.com>
Diffstat (limited to 'recipes-kernel/linux/enea-common.inc')
0 files changed, 0 insertions, 0 deletions