CVE-2016-5696

Bug #1615835 reported by Leonardo Borda
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux-lts-trusty (Ubuntu)
Fix Committed
Medium
Unassigned

Bug Description

Description
net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly
determine the rate of challenge ACK segments, which makes it easier for
man-in-the-middle attackers to hijack TCP sessions via a blind in-window
attack.

Ubuntu-Description
Yue Cao et al discovered a flaw in the TCP implementation's handling
of challenge acks in the Linux kernel. A remote attacker could use
this to cause a denial of service (reset connection) or inject
content into an TCP stream.

References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696
https://<email address hidden>/msg118677.html
http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758
https://lwn.net/Articles/696868/
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5696.html

CVE References

Steve Beattie (sbeattie)
Changed in linux-lts-trusty (Ubuntu):
importance: Undecided → Medium
status: New → Fix Committed
description: updated
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.