From: Eric Dumazet <eduma...@google.com> Date: Mon, 17 Jun 2019 10:03:50 -0700
> Jonathan Looney brought to our attention multiple problems > in TCP stack at the sender side. > > SACK processing can be abused by malicious peers to either > cause overflows, or increase of memory usage. > > First two patches fix the immediate problems. > > Since the malicious peers abuse senders by advertizing a very > small MSS in their SYN or SYNACK packet, the last two > patches add a new sysctl so that admins can chose a higher > limit for MSS clamping. Series applied, thanks Eric.