Print

Print


Synopsis:          Important: kernel security and bug fix update
Advisory ID:       SLSA-2016:1633-1
Issue Date:        2016-08-18
CVE Numbers:       CVE-2016-5696
--

It was found that the RFC 5961 challenge ACK rate limiting as implemented
in the Linux kernel's networking subsystem allowed an off-path attacker to
leak certain information about a given connection by creating congestion
on the global challenge ACK rate limit counter and then measuring the
changes  by probing packets. An off-path attacker could use this flaw to
either  terminate TCP connection and/or inject payload into non-secured
TCP  connection between two endpoints on the network. (CVE-2016-5696,
Important)
--

SL7
  x86_64
    kernel-3.10.0-327.28.3.el7.x86_64.rpm
    kernel-debug-3.10.0-327.28.3.el7.x86_64.rpm
    kernel-debug-debuginfo-3.10.0-327.28.3.el7.x86_64.rpm
    kernel-debug-devel-3.10.0-327.28.3.el7.x86_64.rpm
    kernel-debuginfo-3.10.0-327.28.3.el7.x86_64.rpm
    kernel-debuginfo-common-x86_64-3.10.0-327.28.3.el7.x86_64.rpm
    kernel-devel-3.10.0-327.28.3.el7.x86_64.rpm
    kernel-headers-3.10.0-327.28.3.el7.x86_64.rpm
    kernel-tools-3.10.0-327.28.3.el7.x86_64.rpm
    kernel-tools-debuginfo-3.10.0-327.28.3.el7.x86_64.rpm
    kernel-tools-libs-3.10.0-327.28.3.el7.x86_64.rpm
    perf-3.10.0-327.28.3.el7.x86_64.rpm
    perf-debuginfo-3.10.0-327.28.3.el7.x86_64.rpm
    python-perf-3.10.0-327.28.3.el7.x86_64.rpm
    python-perf-debuginfo-3.10.0-327.28.3.el7.x86_64.rpm
    kernel-tools-libs-devel-3.10.0-327.28.3.el7.x86_64.rpm
  noarch
    kernel-abi-whitelists-3.10.0-327.28.3.el7.noarch.rpm
    kernel-doc-3.10.0-327.28.3.el7.noarch.rpm

- Scientific Linux Development Team