diff options
author | Sona Sarmadi <sona.sarmadi@enea.com> | 2016-08-30 13:52:49 +0200 |
---|---|---|
committer | Martin Borg <martin.borg@enea.com> | 2016-08-30 15:58:53 +0200 |
commit | bac630923de2f10b62e8f2635f192b7fec8165ba (patch) | |
tree | 4c6bc5c8f26ac0dcec3bcf1219bea14c3393b6a4 /recipes-kernel/linux/enea-common.inc | |
parent | 40894e99a839ce0e337bb3a7b83327bd64417d56 (diff) | |
download | meta-enea-bsp-common-bac630923de2f10b62e8f2635f192b7fec8165ba.tar.gz |
kernel-net: CVE-2016-5696
tcp: make challenge acks less predictable
net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not
properly determine the rate of challenge ACK segments, which
makes it easier for man-in-the-middle attackers to hijack TCP
sessions via a blind in-window attack.
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/
patch/?id=5413f1a526d2d51d7a5768133c90936c017165c6
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/
patch/?id=72c2d3bccaba4a0a4de354f9d2d24eccd05bfccf (This a follow-up
to "tcp: make challenge acks less predictable)
Signen-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Martin Borg <martin.borg@enea.com>
Diffstat (limited to 'recipes-kernel/linux/enea-common.inc')
0 files changed, 0 insertions, 0 deletions