group.of.nepali.translators team mailing list archive
-
group.of.nepali.translators team
-
Mailing list archive
-
Message #30776
[Bug 1831637] Re: Remote denial of service (system crash) caused by integer overflow in TCP SACK handling
This bug was fixed in the package linux - 5.0.0-17.18
---------------
linux (5.0.0-17.18) disco; urgency=medium
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragment() should apply sane memory limits
* Remote denial of service (system crash) caused by integer overflow in TCP
SACK handling (LP: #1831637)
- SAUCE: tcp: limit payload size of sacked skbs
-- Stefan Bader <stefan.bader@xxxxxxxxxxxxx> Tue, 04 Jun 2019 17:22:50
+0200
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1831637
Title:
Remote denial of service (system crash) caused by integer overflow in
TCP SACK handling
Status in linux package in Ubuntu:
Fix Released
Status in linux source package in Precise:
New
Status in linux source package in Trusty:
New
Status in linux source package in Xenial:
Fix Released
Status in linux source package in Bionic:
Fix Released
Status in linux source package in Cosmic:
Fix Released
Status in linux source package in Disco:
Fix Released
Bug description:
Jonathan Looney discovered that a remote attacker could cause a denial
of service (system crash) via a maliciously crafted TCP session and a
certain sequence of SACKs.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1831637/+subscriptions