[Bug 1753] Netfilter does not check the sequence number strictly, a spoofed TCP RST packet with an in-window sequence number can cause the change of the mapping state
bugzilla-daemon at netfilter.org
bugzilla-daemon at netfilter.org
Tue May 28 16:32:33 CEST 2024
https://bugzilla.netfilter.org/show_bug.cgi?id=1753
--- Comment #1 from yangyx22 at mails.tsinghua.edu.cn ---
Created attachment 743
--> https://bugzilla.netfilter.org/attachment.cgi?id=743&action=edit
The detailed vulnerability and the steps to reproduce it
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20240528/d713bbff/attachment.html>
More information about the netfilter-buglog
mailing list