[Bug 1753] Netfilter does not check the sequence number strictly, a spoofed TCP RST packet with an in-window sequence number can cause the change of the mapping state

bugzilla-daemon at netfilter.org bugzilla-daemon at netfilter.org
Tue May 28 16:32:33 CEST 2024


https://bugzilla.netfilter.org/show_bug.cgi?id=1753

--- Comment #1 from yangyx22 at mails.tsinghua.edu.cn ---
Created attachment 743
  --> https://bugzilla.netfilter.org/attachment.cgi?id=743&action=edit
The detailed vulnerability and the steps to reproduce it

-- 
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20240528/d713bbff/attachment.html>


More information about the netfilter-buglog mailing list