vulnerability
CentOS: (CVE-2016-5696) (Multiple Advisories): kernel
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:M/Au:N/C:N/I:P/A:P) | Aug 6, 2016 | Aug 22, 2016 | May 7, 2019 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:P)
Published
Aug 6, 2016
Added
Aug 22, 2016
Modified
May 7, 2019
Description
net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
Solution(s)
centos-upgrade-kernelcentos-upgrade-kernel-abi-whitelistscentos-upgrade-kernel-debugcentos-upgrade-kernel-debug-develcentos-upgrade-kernel-develcentos-upgrade-kernel-doccentos-upgrade-kernel-firmwarecentos-upgrade-kernel-headerscentos-upgrade-kernel-toolscentos-upgrade-kernel-tools-libscentos-upgrade-kernel-tools-libs-develcentos-upgrade-perfcentos-upgrade-python-perf
References
- REDHAT-RHSA-2016:1631
- REDHAT-RHSA-2016:1632
- REDHAT-RHSA-2016:1633
- REDHAT-RHSA-2016:1657
- REDHAT-RHSA-2016:1664
- REDHAT-RHSA-2016:1814
- REDHAT-RHSA-2016:1815
- REDHAT-RHSA-2016:1939
- BID-91704
- SECTRACK-1036625
- UBUNTU-USN-3070-1
- UBUNTU-USN-3070-2
- UBUNTU-USN-3070-3
- UBUNTU-USN-3070-4
- UBUNTU-USN-3071-1
- UBUNTU-USN-3071-2
- UBUNTU-USN-3072-1
- UBUNTU-USN-3072-2
- NVD-CVE-2016-5696
- DEBIAN-DLA-609-1
- DEBIAN-DSA-3659

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.