Because of their consequences, both bugs were deemed ideal to integrate into DDoS botnets, and as a result, many Linux distros hurried to patch their systems.
The Linux Kernel team patched both issues in July and August --patches that flowed into the downstream Linux community-- and US Computer Emergency Readiness Team (CERT) released an advisory in mid-August, warning cloud and hosting service providers to update systems as soon as possible.
At the time, in mailing lists carrying discussions about the two vulnerabilities, Juha-Matti Tilli of Nokia Labs and the Department of Communications and Networking at the Aalto University, the researcher who discovered both flaws, said the two bugs might also affect macOS and Windows.
While desktop users will rarely see a FragmentSmack attack, admins of Windows-based servers should apply the latest fixes at their earliest convenience.
The ADV180022 advisory also includes some mitigations that will stop FragmentSmack attacks from jamming a server, in case patches can't be applied right away.
Microsoft says its Azure infrastructure has already been reinforced against this threat. The OS maker did not provide any additional details about FragmentStack's twin vulnerability --SegmentSmack-- but if we are to believe Tilli, that flaw might work against Windows systems as well.