[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-4272-1 linux -- linux

ID: oval:org.secpod.oval:def:53396Date: (C)2019-06-07   (M)2024-04-17
Class: PATCHFamily: unix




CVE-2018-5391 Juha-Matti Tilli discovered a flaw in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker can take advantage of this flaw to trigger time and calculation expensive fragment reassembly algorithms by sending specially crafted packets, leading to remote denial of service. This is mitigated by reducing the default limits on memory usage for incomplete fragmented packets. The same mitigation can be achieved without the need to reboot, by setting the sysctls: net.ipv4.ipfrag_high_thresh = 262144 net.ipv6.ip6frag_high_thresh = 262144 net.ipv4.ipfrag_low_thresh = 196608 net.ipv6.ip6frag_low_thresh = 196608 The default values may still be increased by local configuration if necessary.

Platform:
Linux Mint 3
Product:
linux-image-4.9
Reference:
DSA-4272-1
CVE-2018-5391
CVE    1
CVE-2018-5391
CPE    2
cpe:/a:linux:linux_image:4.9
cpe:/o:linux_mint:linux_mint:3

© SecPod Technologies