Re: DSA for CVE-2016-5696 (off-path blind TCP session attack)

2016-08-12 Thread Rick Moen
Quoting Jakub Wilk (jw...@debian.org): > * Salvatore Bonaccorso , 2016-08-12, 17:35: > >mitigation could be used as per https://lwn.net/Articles/696868/ . > > This is behind paywall at the moment. The relevant part appears to be: > > >there is a mitigation available in the form of the > >tcp_cha

Re: [SECURITY] [DSA 3648-1] wireshark security update

2016-08-12 Thread g . cyr
Bonjour, Je suis en congés du 08 au 19/08 inclus. En mon absence merci de contacter le service web sur l'adresse service...@viadom.fr. Cordialement, Guillaume Cyr

Re: DSA for CVE-2016-5696 (off-path blind TCP session attack)

2016-08-12 Thread Clément Hermann
Le 12/08/2016 à 17:46, Jakub Wilk a écrit : > * Salvatore Bonaccorso , 2016-08-12, 17:35: >> mitigation could be used as per https://lwn.net/Articles/696868/ . > > This is behind paywall at the moment. The relevant part appears to be: > >> there is a mitigation available in the form of the >> tcp

Re: DSA for CVE-2016-5696 (off-path blind TCP session attack)

2016-08-12 Thread Jakub Wilk
* Salvatore Bonaccorso , 2016-08-12, 17:35: mitigation could be used as per https://lwn.net/Articles/696868/ . This is behind paywall at the moment. The relevant part appears to be: there is a mitigation available in the form of the tcp_challenge_ack_limit sysctl knob. Setting that value to s

Re: DSA for CVE-2016-5696 (off-path blind TCP session attack)

2016-08-12 Thread Salvatore Bonaccorso
Hi Richard, On Thu, Aug 11, 2016 at 02:41:29PM +0200, Richard van den Berg wrote: > Dear Debian security team, > > Will there be a DSA written for CVE-2016-5696 [1]? It looks pretty serious > and I'd like to fix this on my systems ASAP. Yes there will be a Linux DSA including the fix for CVE-201