openwrtv4/target
Jo-Philipp Wich 3c2c31bb66 kernel: backport upstream challenge ACK fix (CVE-2016-5696)
Yue Cao claims that current host rate limiting of challenge ACKS
(RFC 5961) could leak enough information to allow a patient attacker
to hijack TCP sessions. He will soon provide details in an academic
paper.

Backports upstream commit 75ff39ccc1bd5d3c455b6822ab09e533c551f758
to the used LEDE kernel versions.

Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2016-08-13 16:23:23 +02:00
..
imagebuilder build: add checksum target 2016-08-01 18:11:21 +02:00
linux kernel: backport upstream challenge ACK fix (CVE-2016-5696) 2016-08-13 16:23:23 +02:00
sdk target/sdk: update README.SDK to explain dependency handling 2016-08-01 12:00:27 +02:00
toolchain IB/SDK/toolchain: use lower cases filenames 2016-06-01 17:54:36 +02:00
Config.in kernel: add plan 9 fs package 2016-08-11 10:45:33 +02:00
Makefile