Search CVE reports


Toggle filters

1 result


CVE-2016-5696

Medium priority

Some fixes available 10 of 24

net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.

27 affected packages

linux, linux-armadaxp, linux-aws, linux-flo, linux-gke...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Fixed
linux-armadaxp Not in release
linux-aws Not affected
linux-flo Not affected
linux-gke Not affected
linux-goldfish Ignored
linux-grouper Not in release
linux-hwe Not affected
linux-hwe-edge Not affected
linux-linaro-omap Not in release
linux-linaro-shared Not in release
linux-linaro-vexpress Not in release
linux-lts-quantal Not in release
linux-lts-raring Not in release
linux-lts-saucy Not in release
linux-lts-trusty Not in release
linux-lts-utopic Not in release
linux-lts-vivid Not in release
linux-lts-wily Not in release
linux-lts-xenial Not in release
linux-maguro Not in release
linux-mako Not affected
linux-manta Not in release
linux-qcm-msm Not in release
linux-raspi2 Fixed
linux-snapdragon Fixed
linux-ti-omap4 Not in release
Show all 27 packages Show less packages