A severe vulnerability has been detected in Linux kernel’s handling of TCP Selective Acknowledgement (SACK) packets. This vulnerability could allow a remote attacker to trigger a kernel panic in systems running the affected software and, as a result, impact the system’s availability.
The impacted platforms include:
- RHEL 8, 7.5, 7.4, 7.3, 7.2, 6, or 6.5
We recommending patching as soon as possible. For further instructions and information on this vulnerability, please review this posting on the Confidential Communications site: https://cc.cybersecurity.ubc.ca/linux-kernel-vulnerabilities/
If you have any questions, please contact firstname.lastname@example.org