|
Message-ID: <b84b5a3f-9e85-e3f2-fbbd-95dac3a76518@enea.com> Date: Sun, 14 Aug 2016 21:36:39 +0200 From: Sona Sarmadi <sona.sarmadi@...a.com> To: <oss-security@...ts.openwall.com> Subject: Re: CVE-2016-5696: linux kernel - challange ack information leak. Hi all, This vulnerability is currently only fixed in mainline kernels (4.7 & 4.8). Does anyone know if there is any work ongoing to backport this fix to the older versions? Thanks //Sona On 2016-07-12 06:33, Wade Mealing wrote: > Gday, > > Red Hat Product Security has been made aware of an important issue in > the Linux kernel's implementation of challenge ACKS as specified in > RFC 5961. An attacker which knows a connections client IP, server IP > and server port can abuse the challenge ACK mechanism > to determine the accuracy of a normally 'blind' attack on the client or server. > > Successful exploitation of this flaw could allow a remote attacker to > inject or control a TCP stream contents in a connection between a > Linux device and its connected client/server. > > * This does NOT mean that cryptographic information is exposed. > * This is not a Man in the Middle (MITM) attack. > > This was reported to Red Hat by Yue Cao, part of the Cyber Security > Group in the University of California > > Thanks, > > Wade Mealing > Red Hat Product Security Team > > Red Hat Bugzilla: > > https://bugzilla.redhat.com/show_bug.cgi?id=1354708 > > Patch: > > https://www.mail-archive.com/netdev@vger.kernel.org/msg118677.html
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.