<html>
<head>
<meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<br>
<a class="moz-txt-link-freetext" href="https://threatpost.com/serious-tcp-bug-in-linux-systems-allows-traffic-hijacking/119804/">https://threatpost.com/serious-tcp-bug-in-linux-systems-allows-traffic-hijacking/119804/</a><br>
<br>
… The vulnerable TCP implementation (CVE-2016-5696) could affect an
untold number of devices running Linux, including embedded
computers, mobile phones and more. …<br>
<br>
… Attacks can disrupt or degrade supposedly encrypted traffic,
including connections over the Tor network, the researchers wrote. …<br>
<br>
<div style="left: -99999px; position: absolute;"><br>
...Systems Allows Traffic Hijacking <a
href="https://wp.me/p3AjUX-vak">https://wp.me/p3AjUX-vak</a>
<div style="left: -99999px; position: absolute;">Attacks can
disrupt or degrade supposedly encrypted traffic, including
connections over the Tor network, the researchers wrote.<br>
<br>
See more at: Serious TCP Bug in Linux Systems Allows Traffic
Hijacking <a href="https://wp.me/p3AjUX-vak">https://wp.me/p3AjUX-vak</a></div>
</div>
<div style="left: -99999px; position: absolute;">Attacks can disrupt
or degrade supposedly encrypted traffic, including connections
over the Tor network, the researchers wrote.<br>
<br>
See more at: Serious TCP Bug in Linux Systems Allows Traffic
Hijacking <a href="https://wp.me/p3AjUX-vak">https://wp.me/p3AjUX-vak</a></div>
<div style="left: -99999px; position: absolute;">Attacks can disrupt
or degrade supposedly encrypted traffic, including connections
over the Tor network, the researchers wrote.<br>
<br>
See more at: Serious TCP Bug in Linux Systems Allows Traffic
Hijacking <a href="https://wp.me/p3AjUX-vak">https://wp.me/p3AjUX-vak</a></div>
</body>
</html>