From: Eric Dumazet <eduma...@google.com>
Date: Mon, 17 Jun 2019 10:03:50 -0700

> Jonathan Looney brought to our attention multiple problems
> in TCP stack at the sender side.
> 
> SACK processing can be abused by malicious peers to either
> cause overflows, or increase of memory usage.
> 
> First two patches fix the immediate problems.
> 
> Since the malicious peers abuse senders by advertizing a very
> small MSS in their SYN or SYNACK packet, the last two
> patches add a new sysctl so that admins can chose a higher
> limit for MSS clamping.

Series applied, thanks Eric.

Reply via email to