- Network Status
- Contact Us
Dear Valued Clients,
A vulnerability targeting the networking stack in linux servers running kernel 2.6.29 or newer has been discovered that allows for Networking denial-of-service of varying severity, leveraging TCP "Selective Acknowlegment" (SACK).
Due to the ease of exploitation, and the impact of exploitation, we will be patching and rebooting all affected, fully-managed hosts overnight.
You can read more about the exploit (and patches mitigating it), here: https://www.openwall.com/lists/oss-security/2019/06/17/5 and here https://access.redhat.com/security/vulnerabilities/tcpsack
Considering the critical nature of this vulnerability, we will have to schedule this maintenance on priority.
Impact of Work:
We will have to update the Kernel. We will have to reboot the VM after the Kernel update. The VM may not be accessible when we reboot the server.
Thursday, June 20, 2019