Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2016-3594

Опубликовано: 15 авг. 2016
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 7

Описание

ELSA-2016-3594: Unbreakable Enterprise kernel security update (IMPORTANT)

kernel-uek [4.1.12-37.6.3]

  • tcp: make challenge acks less predictable (Eric Dumazet) [Orabug: 24010103] [Orabug: 2401010] {CVE-2016-5696}

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

dtrace-modules-4.1.12-37.6.3.el6uek

0.5.2-1.el6

kernel-uek

4.1.12-37.6.3.el6uek

kernel-uek-debug

4.1.12-37.6.3.el6uek

kernel-uek-debug-devel

4.1.12-37.6.3.el6uek

kernel-uek-devel

4.1.12-37.6.3.el6uek

kernel-uek-doc

4.1.12-37.6.3.el6uek

kernel-uek-firmware

4.1.12-37.6.3.el6uek

Oracle Linux 7

Oracle Linux x86_64

dtrace-modules-4.1.12-37.6.3.el7uek

0.5.2-1.el7

kernel-uek

4.1.12-37.6.3.el7uek

kernel-uek-debug

4.1.12-37.6.3.el7uek

kernel-uek-debug-devel

4.1.12-37.6.3.el7uek

kernel-uek-devel

4.1.12-37.6.3.el7uek

kernel-uek-doc

4.1.12-37.6.3.el7uek

kernel-uek-firmware

4.1.12-37.6.3.el7uek

Связанные CVE

Связанные уязвимости

CVSS3: 4.8
ubuntu
около 9 лет назад

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.

CVSS3: 4.8
redhat
около 9 лет назад

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.

CVSS3: 4.8
nvd
около 9 лет назад

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.

CVSS3: 4.8
debian
около 9 лет назад

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly ...

CVSS3: 4.8
github
больше 3 лет назад

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.