net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "3.3"
},
{
"introduced": "0"
},
{
"last_affected": "3.4"
}
]
}