Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
Configuration 10 (hide)
|
Configuration 11 (hide)
|
Configuration 12 (hide)
|
Configuration 13 (hide)
|
Configuration 14 (hide)
|
Configuration 15 (hide)
|
Configuration 16 (hide)
|
Configuration 17 (hide)
|
Configuration 18 (hide)
|
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html - Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html - | |
References | () http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html - | |
References | () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt - | |
References | () http://www.openwall.com/lists/oss-security/2019/06/28/2 - | |
References | () http://www.openwall.com/lists/oss-security/2019/07/06/3 - | |
References | () http://www.openwall.com/lists/oss-security/2019/07/06/4 - | |
References | () http://www.openwall.com/lists/oss-security/2019/10/24/1 - | |
References | () http://www.openwall.com/lists/oss-security/2019/10/29/3 - | |
References | () http://www.vmware.com/security/advisories/VMSA-2019-0010.html - | |
References | () https://access.redhat.com/errata/RHSA-2019:1594 - | |
References | () https://access.redhat.com/errata/RHSA-2019:1602 - | |
References | () https://access.redhat.com/errata/RHSA-2019:1699 - | |
References | () https://access.redhat.com/security/vulnerabilities/tcpsack - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf - | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e - Mailing List, Patch, Vendor Advisory | |
References | () https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md - Patch, Third Party Advisory | |
References | () https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 - Third Party Advisory | |
References | () https://kc.mcafee.com/corporate/index?page=content&id=SB10287 - | |
References | () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0007 - | |
References | () https://seclists.org/bugtraq/2019/Jul/30 - | |
References | () https://security.netapp.com/advisory/ntap-20190625-0001/ - | |
References | () https://support.f5.com/csp/article/K26618426 - Third Party Advisory | |
References | () https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic - Mitigation, Third Party Advisory | |
References | () https://www.kb.cert.org/vuls/id/905115 - | |
References | () https://www.oracle.com/security-alerts/cpujan2020.html - | |
References | () https://www.oracle.com/security-alerts/cpuoct2020.html - | |
References | () https://www.synology.com/security/advisory/Synology_SA_19_28 - | |
References | () https://www.us-cert.gov/ics/advisories/icsa-19-253-03 - | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.3 |
27 Feb 2024, 21:04
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ivanti:connect_secure:-:*:*:*:*:*:*:* | |
First Time |
Ivanti
Ivanti connect Secure |
16 Aug 2023, 14:17
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:* |
cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:* |
Information
Published : 2019-06-19 00:15
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11478
Mitre link : CVE-2019-11478
CVE.ORG link : CVE-2019-11478
JSON object : View
Products Affected
f5
- big-ip_webaccelerator
- big-ip_analytics
- big-ip_link_controller
- big-ip_edge_gateway
- big-ip_policy_enforcement_manager
- big-ip_fraud_protection_service
- big-ip_application_security_manager
- traffix_signaling_delivery_controller
- big-ip_access_policy_manager
- big-ip_global_traffic_manager
- big-ip_domain_name_system
- big-ip_application_acceleration_manager
- big-ip_advanced_firewall_manager
- big-ip_local_traffic_manager
ivanti
- connect_secure
redhat
- enterprise_linux
- enterprise_linux_eus
- enterprise_mrg
- enterprise_linux_aus
- enterprise_linux_atomic_host
pulsesecure
- pulse_policy_secure
- pulse_secure_virtual_application_delivery_controller
canonical
- ubuntu_linux
linux
- linux_kernel