A new vulnerability in the Linux kernel was publicly disclosed yesterday. SegmentSmack (CVE-2018-5390) allows attackers to trigger the most resource-intensive code paths for TCP stream reassembly with low rates of specially crafted packets, leading to a remote denial of service.
The affected versions of the Linux kernel are versions 4.9+. If you have any existing running server (virtual machines) or if you have a Bitnami stack installed on your computer, you will need to update the operating system on your own.
To check if your system is not vulnerable, execute the command below:
Find the information of the vulnerable Kernel's versions and how to upgrade the package in our blog post: https://blog.bitnami.com/2018/08/linux-kernel-tcp.html