net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5696