Synopsis: Important: kernel security and bug fix update Advisory ID: SLSA-2016:1633-1 Issue Date: 2016-08-18 CVE Numbers: CVE-2016-5696 -- It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel's networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network. (CVE-2016-5696, Important) -- SL7 x86_64 kernel-3.10.0-327.28.3.el7.x86_64.rpm kernel-debug-3.10.0-327.28.3.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.28.3.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.28.3.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.28.3.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.28.3.el7.x86_64.rpm kernel-devel-3.10.0-327.28.3.el7.x86_64.rpm kernel-headers-3.10.0-327.28.3.el7.x86_64.rpm kernel-tools-3.10.0-327.28.3.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.28.3.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.28.3.el7.x86_64.rpm perf-3.10.0-327.28.3.el7.x86_64.rpm perf-debuginfo-3.10.0-327.28.3.el7.x86_64.rpm python-perf-3.10.0-327.28.3.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.28.3.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.28.3.el7.x86_64.rpm noarch kernel-abi-whitelists-3.10.0-327.28.3.el7.noarch.rpm kernel-doc-3.10.0-327.28.3.el7.noarch.rpm - Scientific Linux Development Team