Announcement

Collapse
No announcement yet.

SegmentSmack kernel bug

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    SegmentSmack kernel bug

    https://www.zdnet.com/article/linux-...ny-dos-attack/

    A remote attacker could cause a DoS by sending specially modified packets within ongoing TCP sessions. But sustaining the DoS condition would mean an attacker needs to have continuous two-way TCP sessions to a reachable and open port.




    Because of this requirement, the attacks can't be performed with spoofed IP addresses, notes CERT/CC's Trent Novelly.
    The bug, which has the identifier CVE-2018-5390, has been dubbed 'SegmentSmack' by Red Hat.

    "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
    – John F. Kennedy, February 26, 1962.

    #2
    Seems like a good firewall should be able to protect from that one, That why I use UFW on Kubuntu and keep the ports all closed except when I need one of them then I just open that port and close it again when I don't need it any more.

    It's a good rule of thumb to keep your attack surface as small as possible.
    Thanks for posting GG
    Dave Kubuntu 20.04 Registered Linux User #462608

    Wireless Script: http://ubuntuforums.org/showthread.p...5#post12350385

    Comment


      #3
      That’s what I do as well
      "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
      – John F. Kennedy, February 26, 1962.

      Comment

      Working...
      X