1.4 billion Android devices affected by Linux TCP Flaw

Linux logoThe security bug discovered in the Linux kernel's implementation of the TCP protocol also affects a large portion of the Android ecosystem, mobile security vendor Lookout reports.

According to researchers, CVE-2016-5696, the Linux TCP bug, affects around 80 percent of all Android devices in use today, which is around 1.4 billion devices. The reason for this is the fact that the Android OS is built on a modified version of the Linux kernel.

The Linux Foundation has already taken all the steps to mitigate this security flaw, having patched the Linux kernel on July 11, 2016.

The security bug, CVE-2016-5696, allows an attacker who is not in a man-in-the-middle position to probe servers or users for active connections and then guess the packet sequence.

This enables the attacker to enter the packet flow between two parties, sniff on unencrypted traffic, or shut down encrypted connections. All Linux kernel versions between v3.6 and up to v4.7 are vulnerable.

The first vulnerable version that featured this TCP implementation flaw, version 3.6, was released in 2012 and was also used to create the Android OS 4.4 (KitKat).

Since security researchers disclosed the flaw last week, Google has not yet released any security patches. Google usually releases security patches at the start of each month, but it is highly unlikely that the Android OS would feature a security patch for such a massive feature like the TCP stack just after a few weeks.

Even if security vendors have not discovered any weaponized exploit utilizing this flaw, Lookout recommends that all users protect themselves by encrypting their traffic.

Users can do this by using encrypted apps, navigating sites via their HTTPS versions, or by employing a VPN. For more technical users, the Lookout team recommends the following steps:

If you have a rooted Android device you can make this attack harder by using the sysctl tool and changing the value for net.ipv4.tcp_challenge_ack_limit to something very large, e.g. net.ipv4.tcp_challenge_ack_limit = 999999999

Source: Softpedia

Tags: Android, Linux, OSes, security

Add comment

Your name:
Sign in with:
Your comment:

Enter code:

E-mail (not required)
E-mail will not be disclosed to the third party

Last news

A mobile hotspot in Australia will be capable of hitting gigabit speeds on the go
A new game could be in the works as Blizzard appears to have been hiring for a Diablo-related project
Nokia CEO Rajeev Suri will speak at MWC 2017
However what if you could go way, way back?
The Helio P15 packs an octa-core Cortex-A53 processor clocked at 2.2GHz
Samsung claims up to 27-percent higher performance or 40-percent lower power
Preliminary data for October shows another Windows 10 boom
Samsung Galaxy TabPro S - a tablet with the Windows-keyboard
The first Windows-tablet with the 12-inch display Super AMOLED
June 7, 2016 /
Keyboards for iOS
Ten iOS keyboards review
July 18, 2015 /
Samsung E1200 Mobile Phone Review
A cheap phone with a good screen
March 8, 2015 / 4
Creative Sound Blaster Z sound card review
Good sound for those who are not satisfied with the onboard solution
September 25, 2014 / 2
Samsung Galaxy Gear: Smartwatch at High Price
The first smartwatch from Samsung - almost a smartphone with a small body
December 19, 2013 /
HP Slate 7 is a 7-inch Android 4 Tablet PC with good sound
A cost-effective, 7-inch tablet PC from a renowned manufacturer
October 25, 2013 / 4

News Archive



Do you use microSD card with your phone?
or leave your own version in comments