** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-5696

** Changed in: linux-lts-trusty (Ubuntu)
   Importance: Undecided => Medium

** Changed in: linux-lts-trusty (Ubuntu)
       Status: New => Fix Committed

** Description changed:

  Description
  net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly
  determine the rate of challenge ACK segments, which makes it easier for
  man-in-the-middle attackers to hijack TCP sessions via a blind in-window
  attack.
  
  Ubuntu-Description
  Yue Cao et al discovered a flaw in the TCP implementation's handling
  of challenge acks in the Linux kernel. A remote attacker could use
  this to cause a denial of service (reset connection) or inject
  content into an TCP stream.
  
  References
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696
  https://www.mail-archive.com/netdev@vger.kernel.org/msg118677.html
  
http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758
  https://lwn.net/Articles/696868/
+ https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5696.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1615835

Title:
  CVE-2016-5696

Status in linux-lts-trusty package in Ubuntu:
  Fix Committed

Bug description:
  Description
  net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly
  determine the rate of challenge ACK segments, which makes it easier for
  man-in-the-middle attackers to hijack TCP sessions via a blind in-window
  attack.

  Ubuntu-Description
  Yue Cao et al discovered a flaw in the TCP implementation's handling
  of challenge acks in the Linux kernel. A remote attacker could use
  this to cause a denial of service (reset connection) or inject
  content into an TCP stream.

  References
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696
  https://www.mail-archive.com/netdev@vger.kernel.org/msg118677.html
  
http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758
  https://lwn.net/Articles/696868/
  https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5696.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-lts-trusty/+bug/1615835/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to