First published: Tue Jun 11 2019(Updated: )
An integer overflow flaw was found in the way the Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.15.3.el6 | 0:2.6.32-754.15.3.el6 |
redhat/kernel | <0:2.6.32-431.95.3.el6 | 0:2.6.32-431.95.3.el6 |
redhat/kernel | <0:2.6.32-504.79.3.el6 | 0:2.6.32-504.79.3.el6 |
redhat/kernel-rt | <0:3.10.0-957.21.3.rt56.935.el7 | 0:3.10.0-957.21.3.rt56.935.el7 |
redhat/kernel | <0:3.10.0-957.21.3.el7 | 0:3.10.0-957.21.3.el7 |
redhat/kernel-alt | <0:4.14.0-115.8.2.el7a | 0:4.14.0-115.8.2.el7a |
redhat/kernel | <0:3.10.0-327.79.2.el7 | 0:3.10.0-327.79.2.el7 |
redhat/kernel | <0:3.10.0-514.66.2.el7 | 0:3.10.0-514.66.2.el7 |
redhat/kernel | <0:3.10.0-693.50.3.el7 | 0:3.10.0-693.50.3.el7 |
redhat/kernel | <0:3.10.0-862.34.2.el7 | 0:3.10.0-862.34.2.el7 |
redhat/kernel-rt | <0:4.18.0-80.4.2.rt9.152.el8_0 | 0:4.18.0-80.4.2.rt9.152.el8_0 |
redhat/kernel | <0:4.18.0-80.4.2.el8_0 | 0:4.18.0-80.4.2.el8_0 |
redhat/kernel-rt | <1:3.10.0-693.50.3.rt56.644.el6 | 1:3.10.0-693.50.3.rt56.644.el6 |
redhat/redhat-release-virtualization-host | <0:4.2-11.1.el7 | 0:4.2-11.1.el7 |
redhat/redhat-virtualization-host | <0:4.2-20190618.0.el7_6 | 0:4.2-20190618.0.el7_6 |
redhat/redhat-release-virtualization-host | <0:4.3.4-1.el7e | 0:4.3.4-1.el7e |
redhat/redhat-virtualization-host | <0:4.3.4-20190620.3.el7_6 | 0:4.3.4-20190620.3.el7_6 |
debian/linux | 4.19.249-2 4.19.289-2 5.10.197-1 5.10.191-1 6.1.66-1 6.1.52-1 6.5.13-1 6.6.8-1 | |
Linux Kernel | >=2.6.29<3.16.69 | |
Linux Kernel | >=3.17<4.4.182 | |
Linux Kernel | >=4.5<4.9.182 | |
Linux Kernel | >=4.10<4.14.127 | |
Linux Kernel | >=4.15<4.19.52 | |
Linux Kernel | >=4.20<5.1.11 | |
F5 BIG-IP Advanced Firewall Manager | >=11.5.2<=11.6.4 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.4 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<=13.1.1 | |
F5 BIG-IP Advanced Firewall Manager | >=14.0.0<=14.1.0 | |
F5 BIG-IP Advanced Firewall Manager | =15.0.0 | |
F5 Access Policy Manager | >=11.5.2<=11.6.4 | |
F5 Access Policy Manager | >=12.1.0<=12.1.4 | |
F5 Access Policy Manager | >=13.1.0<=13.1.1 | |
F5 Access Policy Manager | >=14.0.0<=14.1.0 | |
F5 Access Policy Manager | =15.0.0 | |
F5 BIG-IP Application Acceleration Manager | >=11.5.2<=11.6.4 | |
F5 BIG-IP Application Acceleration Manager | >=12.1.0<=12.1.4 | |
F5 BIG-IP Application Acceleration Manager | >=13.1.0<=13.1.1 | |
F5 BIG-IP Application Acceleration Manager | >=14.0.0<=14.1.0 | |
F5 BIG-IP Application Acceleration Manager | =15.0.0 | |
F5 BIG-IP Link Controller | >=11.5.2<=11.6.4 | |
F5 BIG-IP Link Controller | >=12.1.0<=12.1.4 | |
F5 BIG-IP Link Controller | >=13.1.0<=13.1.1 | |
F5 BIG-IP Link Controller | >=14.0.0<=14.1.0 | |
F5 BIG-IP Link Controller | =15.0.0 | |
F5 BIG-IP Policy Enforcement Manager | >=11.5.2<=11.6.4 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<=12.1.4 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.0<=13.1.1 | |
F5 BIG-IP Policy Enforcement Manager | >=14.0.0<=14.1.0 | |
F5 BIG-IP Policy Enforcement Manager | =15.0.0 | |
F5 BIG-IP WebAccelerator | >=11.5.2<=11.6.4 | |
F5 BIG-IP WebAccelerator | >=12.1.0<=12.1.4 | |
F5 BIG-IP WebAccelerator | >=13.1.0<=13.1.1 | |
F5 BIG-IP WebAccelerator | >=14.0.0<=14.1.0 | |
F5 BIG-IP WebAccelerator | =15.0.0 | |
F5 Application Security Manager | >=11.5.2<=11.6.4 | |
F5 Application Security Manager | >=12.1.0<=12.1.4 | |
F5 Application Security Manager | >=13.1.0<=13.1.1 | |
F5 Application Security Manager | >=14.0.0<=14.1.0 | |
F5 Application Security Manager | =15.0.0 | |
Riverbed SteelApp Traffic Manager | >=11.5.2<=11.6.4 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<=12.1.4 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<=13.1.1 | |
Riverbed SteelApp Traffic Manager | >=14.0.0<=14.1.0 | |
Riverbed SteelApp Traffic Manager | =15.0.0 | |
F5 BIG-IP Fraud Protection Service | >=11.5.2<=11.6.4 | |
F5 BIG-IP Fraud Protection Service | >=12.1.0<=12.1.4 | |
F5 BIG-IP Fraud Protection Service | >=13.1.0<=13.1.1 | |
F5 BIG-IP Fraud Protection Service | >=14.0.0<=14.1.0 | |
F5 BIG-IP Fraud Protection Service | =15.0.0 | |
Riverbed SteelApp Traffic Manager | >=11.5.2<=11.6.4 | |
Riverbed SteelApp Traffic Manager | >=12.1.0<=12.1.4 | |
Riverbed SteelApp Traffic Manager | >=13.1.0<=13.1.1 | |
Riverbed SteelApp Traffic Manager | >=14.0.0<=14.1.0 | |
Riverbed SteelApp Traffic Manager | =15.0.0 | |
F5 BIG-IP Analytics | >=11.5.2<=11.6.4 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.4 | |
F5 BIG-IP Analytics | >=13.1.0<=13.1.1 | |
F5 BIG-IP Analytics | >=14.0.0<=14.1.0 | |
F5 BIG-IP Analytics | =15.0.0 | |
F5 BIG-IP Edge Gateway | >=11.5.2<=11.6.4 | |
F5 BIG-IP Edge Gateway | >=12.1.0<=12.1.4 | |
F5 BIG-IP Edge Gateway | >=13.1.0<=13.1.1 | |
F5 BIG-IP Edge Gateway | >=14.0.0<=14.1.0 | |
F5 BIG-IP Edge Gateway | =15.0.0 | |
F5 BIG-IP | >=11.5.2<=11.6.4 | |
F5 BIG-IP | >=12.1.0<=12.1.4 | |
F5 BIG-IP | >=13.1.0<=13.1.1 | |
F5 BIG-IP | >=14.0.0<=14.1.0 | |
F5 BIG-IP | =15.0.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Ubuntu | =19.04 | |
Red Hat Enterprise Linux Atomic Host | ||
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =6.5 | |
Red Hat Enterprise Linux | =6.6 | |
Red Hat Enterprise Linux Server EUS | =7.4 | |
Red Hat Enterprise Linux Server EUS | =7.5 | |
Red Hat Enterprise MRG | =2.0 | |
Ivanti Pulse Connect Secure | ||
Pulse Policy Secure | ||
Pulse Secure Virtual Application Delivery Controller | ||
F5 Traffix Systems Signaling Delivery Controller | >=5.0.0<=5.1.0 | |
Ivanti Pulse Connect Secure | ||
Siemens Simatic Cloud Connect 7 CC712 | <1.1.5 | 1.1.5 |
Siemens ROX | <2.13.3 | 2.13.3 |
Siemens RUGGEDCOM APE 1404 Linux | ||
Siemens RUGGEDCOM RM1224 | <6.2 | 6.2 |
Siemens RUGGEDCOM RX 1400 VPE Debian Linux | ||
Siemens RUGGEDCOM RX 1400 VPE | ||
Siemens SCALANCE M804PB | <6.2 | 6.2 |
Siemens Scalance M812-1 ADSL Router | <6.2 | 6.2 |
Siemens Scalance M812-1 ADSL Router | <6.2 | 6.2 |
Siemens Scalance M816-1 ADSL-Router Firmware | <6.2 | 6.2 |
Siemens Scalance M816-1 ADSL-Router Firmware | <6.2 | 6.2 |
Siemens SCALANCE M826-2 SHDSL-Router | <6.2 | 6.2 |
Siemens SCALANCE M874-2 | <6.2 | 6.2 |
Siemens SCALANCE M874-3 | <6.2 | 6.2 |
Siemens Scalance M875 Firmware | ||
Siemens SCALANCE M876-3 | <6.2 | 6.2 |
Siemens SCALANCE M876-3 | <6.2 | 6.2 |
Siemens SCALANCE M876-4 | <6.2 | 6.2 |
Siemens SCALANCE M876-4 | <6.2 | 6.2 |
Siemens Scalance S602 Firmware | <4.1 | 4.1 |
Siemens Scalance S612 Firmware | <4.1 | 4.1 |
Siemens SCALANCE S615 | <6.2 | 6.2 |
Siemens Scalance S623 Firmware | <4.1 | 4.1 |
Siemens Scalance S627-2M Firmware | <4.1 | 4.1 |
Siemens SCALANCE SC622-2C | <2.0.1 | 2.0.1 |
Siemens SCALANCE SC632-2C | <2.0.1 | 2.0.1 |
Siemens SCALANCE SC636-2C | <2.0.1 | 2.0.1 |
Siemens SCALANCE SC642-2C | <2.0.1 | 2.0.1 |
Siemens SCALANCE SC646-2C | <2.0.1 | 2.0.1 |
Siemens Scalance W1750D Firmware | <8.6.0 | 8.6.0 |
Siemens SCALANCE W-700 | <6.4 | 6.4 |
Siemens SCALANCE W1700 IEEE 802.11ac | <2.0 | 2.0 |
Siemens SCALANCE WLC711 | ||
Siemens SCALANCE WLC712 | ||
Siemens SIMATIC CM 1542-1 Firmware | <3.0 | 3.0 |
Siemens SIMATIC CP 343-1 Advanced |
For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-11477 has a high severity rating due to the potential for an integer overflow that could lead to denial of service or code execution.
To fix CVE-2019-11477, update your Linux kernel to the fixed versions provided by your distribution, such as those specified in Red Hat and Debian advisories.
CVE-2019-11477 affects several Linux kernel versions, specifically versions prior to the vendor-specific patched releases.
Exploits associated with CVE-2019-11477 may allow attackers to cause denial of service or potentially execute arbitrary code on affected systems.
Users running affected versions of the Linux kernel, especially on servers and devices utilizing TCP, should be aware of the vulnerability and take action to secure their systems.