diff options
| author | Eric Dumazet <edumazet@google.com> | 2019-06-15 17:47:27 -0700 |
|---|---|---|
| committer | Moyster <oysterized@gmail.com> | 2019-07-18 20:56:35 +0200 |
| commit | 0d833add2ecfdc493169b01b5f168f5068c25c6b (patch) | |
| tree | 938497bdfbd42e35a180265c2c8db3c4fbd2ed5f /net/ceph | |
| parent | 0cf7fa57098edfb7e381aca397c75a14ad7e9379 (diff) | |
BACKPORT: tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
commit 967c05aee439e6e5d7d805e195b3a20ef5c433d6 upstream.
If mtu probing is enabled tcp_mtu_probing() could very well end up
with a too small MSS.
Use the new sysctl tcp_min_snd_mss to make sure MSS search
is performed in an acceptable range.
CVE-2019-11479 -- tcp mss hardcoded to 48
Signed-off-by: Eric Dumazet <edumazet@google.com>
Reported-by: Jonathan Lemon <jonathan.lemon@gmail.com>
Cc: Jonathan Looney <jtl@netflix.com>
Acked-by: Neal Cardwell <ncardwell@google.com>
Cc: Yuchung Cheng <ycheng@google.com>
Cc: Tyler Hicks <tyhicks@canonical.com>
Cc: Bruce Curtis <brucec@netflix.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
[BACKPORT to 3.10: use previous sysctrl method]
Signed-off-by: syphyr@gmail.com
Change-Id: I02c8330a38992461b89081196b1b0ad0add0e6ad
Diffstat (limited to 'net/ceph')
0 files changed, 0 insertions, 0 deletions
