|Bugzilla:||732658: CVE-2011-3188 kernel: net: improve sequence number generation|
The MITRE CVE dictionary describes this issue as:
The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and sending crafted packets.
This issue affects the Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, 6, and Red Hat Enterprise MRG. It has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1386.html, https://rhn.redhat.com/errata/RHSA-2011-1465.html, and https://rhn.redhat.com/errata/RHSA-2012-0010.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.
CVSS v2 metrics
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat security errata
|MRG Grid for RHEL 6 Server v.2 (kernel-rt)||RHSA-2012:0010||January 10, 2012|
|RHEV Hypervisor for RHEL-5 (rhev-hypervisor)||RHSA-2011:1408||October 26, 2011|
|Red Hat Enterprise Linux EUS (v. 5.6 server) (kernel)||RHSA-2011:1419||November 01, 2011|
|Red Hat Enterprise Linux version 5 (kernel)||RHSA-2011:1386||October 20, 2011|
|Red Hat Enterprise Linux version 6 (kernel)||RHSA-2011:1465||November 22, 2011|
Red Hat would like to thank Dan Kaminsky for reporting this issue.
This page is generated automatically and has not been checked for errors or omissions.
For clarification or corrections please contact the Red Hat Security Response Team.