Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 14 Aug 2018 17:09:38 -0400
From: "David T." <davidmthomsen@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2018-5391: Linux kernel: IP fragments with
 random offsets allow a remote denial of service (FragmentSmack)

Is this the same as "SegmentSmack" that came out last week, CVE-2018-5390?
Or, what is the difference?

On Tue, Aug 14, 2018 at 16:31 Vladis Dronov <vdronov@...hat.com> wrote:

> Heololo,
>
> A flaw named FragmentSmack was found in the way the Linux kernel handled
> reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could
> use this flaw to trigger time and calculation expensive fragment reassembly
> algorithms by sending specially crafted packets which could lead to a CPU
> saturation and hence a denial of service on the system.
>
> External References:
>
> https://www.kb.cert.org/vuls/id/641765
>
> https://access.redhat.com/articles/3553061
>
> https://bugzilla.redhat.com/show_bug.cgi?id=1609664
>
> Best regards,
> Vladis Dronov | Red Hat, Inc. | Product Security Engineer
>
-- 
Very respectfully,

David M Thomsen

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.