[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#639426: Changes from longterm 2.6.32.45



On Sat, 2011-08-27 at 04:18 +0100, Ben Hutchings wrote:
> 263b893 net: Compute protocol sequence numbers and fragment IDs using MD5.
> 
> Fixes cryptographic weakness that allows blind spoofing of TCP/IP
> packets (i.e. the attacker does not need access to a switch or router
> between the connection endpoints).  This may allow privilege escalation
> or denial of service, depending on the protocols and authentication
> schemes used by a targetted system.

This is CVE-2011-3188, and will be included in 2.6.32-35squeeze1.

Ben.

Attachment: signature.asc
Description: This is a digitally signed message part


Reply to: