https://www.zdnet.com/article/linux-...ny-dos-attack/
A remote attacker could cause a DoS by sending specially modified packets within ongoing TCP sessions. But sustaining the DoS condition would mean an attacker needs to have continuous two-way TCP sessions to a reachable and open port.
Because of this requirement, the attacks can't be performed with spoofed IP addresses, notes CERT/CC's Trent Novelly.
The bug, which has the identifier CVE-2018-5390, has been dubbed 'SegmentSmack' by Red Hat.
Because of this requirement, the attacks can't be performed with spoofed IP addresses, notes CERT/CC's Trent Novelly.
The bug, which has the identifier CVE-2018-5390, has been dubbed 'SegmentSmack' by Red Hat.
Comment