openwrt/target/linux/generic
Jo-Philipp Wich 3c2c31bb66 kernel: backport upstream challenge ACK fix (CVE-2016-5696)
Yue Cao claims that current host rate limiting of challenge ACKS
(RFC 5961) could leak enough information to allow a patient attacker
to hijack TCP sessions. He will soon provide details in an academic
paper.

Backports upstream commit 75ff39ccc1bd5d3c455b6822ab09e533c551f758
to the used LEDE kernel versions.

Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2016-08-13 16:23:23 +02:00
..
base-files
files kernel: adm6996: set carrier status 2016-08-10 03:04:08 +02:00
image treewide: replace nbd@openwrt.org with nbd@nbd.name 2016-06-07 08:58:42 +02:00
patches-3.18 kernel: backport upstream challenge ACK fix (CVE-2016-5696) 2016-08-13 16:23:23 +02:00
patches-4.1 kernel: backport upstream challenge ACK fix (CVE-2016-5696) 2016-08-13 16:23:23 +02:00
patches-4.4 kernel: backport upstream challenge ACK fix (CVE-2016-5696) 2016-08-13 16:23:23 +02:00
PATCHES
config-3.18 Revert "kernel: remove long obsolete gpio spi controller driver patch" 2016-08-04 23:10:15 +02:00
config-4.1 Revert "kernel: remove long obsolete gpio spi controller driver patch" 2016-08-04 23:10:15 +02:00
config-4.4 Revert "kernel: remove long obsolete gpio spi controller driver patch" 2016-08-04 23:10:15 +02:00