** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-5696

** Changed in: linux-lts-trusty (Ubuntu)
   Importance: Undecided => Medium

** Changed in: linux-lts-trusty (Ubuntu)
       Status: New => Fix Committed

** Description changed:

  Description
  net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly
  determine the rate of challenge ACK segments, which makes it easier for
  man-in-the-middle attackers to hijack TCP sessions via a blind in-window
  attack.
  
  Ubuntu-Description
  Yue Cao et al discovered a flaw in the TCP implementation's handling
  of challenge acks in the Linux kernel. A remote attacker could use
  this to cause a denial of service (reset connection) or inject
  content into an TCP stream.
  
  References
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696
  https://www.mail-archive.com/[email protected]/msg118677.html
  
http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758
  https://lwn.net/Articles/696868/
+ https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5696.html

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1615835

Title:
  CVE-2016-5696

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-lts-trusty/+bug/1615835/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to