This bug was fixed in the package linux-oem - 4.15.0-1043.48
--------------- linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard manipulation (LP: #1831638) - SAUCE: tcp: tcp_fragment() should apply sane memory limits * Remote denial of service (system crash) caused by integer overflow in TCP SACK handling (LP: #1831637) - SAUCE: tcp: limit payload size of sacked skbs
-- Stefan Bader <email address hidden> Fri, 14 Jun 2019 10:39:16 +0200
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---------------
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragment() should apply sane memory limits
* Remote denial of service (system crash) caused by integer overflow in TCP
SACK handling (LP: #1831637)
- SAUCE: tcp: limit payload size of sacked skbs
-- Stefan Bader <email address hidden> Fri, 14 Jun 2019 10:39:16 +0200