4.8 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:P/A:P
0.004 Low
EPSS
Percentile
74.5%
net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly
determine the rate of challenge ACK segments, which makes it easier for
remote attackers to hijack TCP sessions via a blind in-window attack.
Author | Note |
---|---|
jdstrand | android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support |
sbeattie | fix is going to land in Ubuntu kernels in this SRU cycle, with a likely release date of Aug 27. Earlier access to the kernels with the fix will be available from the -proposed pocket, though they come with the risk of being less tested. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 12.04 | noarch | linux-armadaxp | < 3.2.0-1672.98 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-lts-trusty | < 3.13.0-95.142~precise1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-vivid | < 3.19.0-68.76~14.04.1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-xenial | < 4.4.0-36.55~14.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-raspi2 | < 4.4.0-1021.27 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-snapdragon | < 4.4.0-1024.27 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-ti-omap4 | < 3.2.0-1487.114 | UNKNOWN |
ubuntu | 12.04 | noarch | linux | < 3.2.0-109.150 | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < 3.13.0-95.142 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < 4.4.0-36.55 | UNKNOWN |
git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696
launchpad.net/bugs/cve/CVE-2016-5696
lwn.net/Articles/696868/
nvd.nist.gov/vuln/detail/CVE-2016-5696
security-tracker.debian.org/tracker/CVE-2016-5696
ubuntu.com/security/notices/USN-3070-1
ubuntu.com/security/notices/USN-3070-2
ubuntu.com/security/notices/USN-3070-3
ubuntu.com/security/notices/USN-3070-4
ubuntu.com/security/notices/USN-3071-1
ubuntu.com/security/notices/USN-3071-2
ubuntu.com/security/notices/USN-3072-1
ubuntu.com/security/notices/USN-3072-2
www.mail-archive.com/[email protected]/msg118677.html
4.8 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:P/A:P
0.004 Low
EPSS
Percentile
74.5%