7.8
CWE
190 400
Advisory Published
CVE Published
CVE Published
Updated

CVE-2019-11477: Integer overflow in TCP_SKB_CB(skb)->tcp_gso_segs

First published: Tue Jun 11 2019(Updated: )

An integer overflow flaw was found in the way the Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS).

Credit: security@ubuntu.com

Affected SoftwareAffected VersionHow to fix
redhat/kernel<0:2.6.32-754.15.3.el6
0:2.6.32-754.15.3.el6
redhat/kernel<0:2.6.32-431.95.3.el6
0:2.6.32-431.95.3.el6
redhat/kernel<0:2.6.32-504.79.3.el6
0:2.6.32-504.79.3.el6
redhat/kernel-rt<0:3.10.0-957.21.3.rt56.935.el7
0:3.10.0-957.21.3.rt56.935.el7
redhat/kernel<0:3.10.0-957.21.3.el7
0:3.10.0-957.21.3.el7
redhat/kernel-alt<0:4.14.0-115.8.2.el7a
0:4.14.0-115.8.2.el7a
redhat/kernel<0:3.10.0-327.79.2.el7
0:3.10.0-327.79.2.el7
redhat/kernel<0:3.10.0-514.66.2.el7
0:3.10.0-514.66.2.el7
redhat/kernel<0:3.10.0-693.50.3.el7
0:3.10.0-693.50.3.el7
redhat/kernel<0:3.10.0-862.34.2.el7
0:3.10.0-862.34.2.el7
redhat/kernel-rt<0:4.18.0-80.4.2.rt9.152.el8_0
0:4.18.0-80.4.2.rt9.152.el8_0
redhat/kernel<0:4.18.0-80.4.2.el8_0
0:4.18.0-80.4.2.el8_0
redhat/kernel-rt<1:3.10.0-693.50.3.rt56.644.el6
1:3.10.0-693.50.3.rt56.644.el6
redhat/redhat-release-virtualization-host<0:4.2-11.1.el7
0:4.2-11.1.el7
redhat/redhat-virtualization-host<0:4.2-20190618.0.el7_6
0:4.2-20190618.0.el7_6
redhat/redhat-release-virtualization-host<0:4.3.4-1.el7e
0:4.3.4-1.el7e
redhat/redhat-virtualization-host<0:4.3.4-20190620.3.el7_6
0:4.3.4-20190620.3.el7_6
debian/linux
4.19.249-2
4.19.289-2
5.10.197-1
5.10.191-1
6.1.66-1
6.1.52-1
6.5.13-1
6.6.8-1
Linux Kernel>=2.6.29<3.16.69
Linux Kernel>=3.17<4.4.182
Linux Kernel>=4.5<4.9.182
Linux Kernel>=4.10<4.14.127
Linux Kernel>=4.15<4.19.52
Linux Kernel>=4.20<5.1.11
F5 BIG-IP Advanced Firewall Manager>=11.5.2<=11.6.4
F5 BIG-IP Advanced Firewall Manager>=12.1.0<=12.1.4
F5 BIG-IP Advanced Firewall Manager>=13.1.0<=13.1.1
F5 BIG-IP Advanced Firewall Manager>=14.0.0<=14.1.0
F5 BIG-IP Advanced Firewall Manager=15.0.0
F5 Access Policy Manager>=11.5.2<=11.6.4
F5 Access Policy Manager>=12.1.0<=12.1.4
F5 Access Policy Manager>=13.1.0<=13.1.1
F5 Access Policy Manager>=14.0.0<=14.1.0
F5 Access Policy Manager=15.0.0
F5 BIG-IP Application Acceleration Manager>=11.5.2<=11.6.4
F5 BIG-IP Application Acceleration Manager>=12.1.0<=12.1.4
F5 BIG-IP Application Acceleration Manager>=13.1.0<=13.1.1
F5 BIG-IP Application Acceleration Manager>=14.0.0<=14.1.0
F5 BIG-IP Application Acceleration Manager=15.0.0
F5 BIG-IP Link Controller>=11.5.2<=11.6.4
F5 BIG-IP Link Controller>=12.1.0<=12.1.4
F5 BIG-IP Link Controller>=13.1.0<=13.1.1
F5 BIG-IP Link Controller>=14.0.0<=14.1.0
F5 BIG-IP Link Controller=15.0.0
F5 BIG-IP Policy Enforcement Manager>=11.5.2<=11.6.4
F5 BIG-IP Policy Enforcement Manager>=12.1.0<=12.1.4
F5 BIG-IP Policy Enforcement Manager>=13.1.0<=13.1.1
F5 BIG-IP Policy Enforcement Manager>=14.0.0<=14.1.0
F5 BIG-IP Policy Enforcement Manager=15.0.0
F5 BIG-IP WebAccelerator>=11.5.2<=11.6.4
F5 BIG-IP WebAccelerator>=12.1.0<=12.1.4
F5 BIG-IP WebAccelerator>=13.1.0<=13.1.1
F5 BIG-IP WebAccelerator>=14.0.0<=14.1.0
F5 BIG-IP WebAccelerator=15.0.0
F5 Application Security Manager>=11.5.2<=11.6.4
F5 Application Security Manager>=12.1.0<=12.1.4
F5 Application Security Manager>=13.1.0<=13.1.1
F5 Application Security Manager>=14.0.0<=14.1.0
F5 Application Security Manager=15.0.0
Riverbed SteelApp Traffic Manager>=11.5.2<=11.6.4
Riverbed SteelApp Traffic Manager>=12.1.0<=12.1.4
Riverbed SteelApp Traffic Manager>=13.1.0<=13.1.1
Riverbed SteelApp Traffic Manager>=14.0.0<=14.1.0
Riverbed SteelApp Traffic Manager=15.0.0
F5 BIG-IP Fraud Protection Service>=11.5.2<=11.6.4
F5 BIG-IP Fraud Protection Service>=12.1.0<=12.1.4
F5 BIG-IP Fraud Protection Service>=13.1.0<=13.1.1
F5 BIG-IP Fraud Protection Service>=14.0.0<=14.1.0
F5 BIG-IP Fraud Protection Service=15.0.0
Riverbed SteelApp Traffic Manager>=11.5.2<=11.6.4
Riverbed SteelApp Traffic Manager>=12.1.0<=12.1.4
Riverbed SteelApp Traffic Manager>=13.1.0<=13.1.1
Riverbed SteelApp Traffic Manager>=14.0.0<=14.1.0
Riverbed SteelApp Traffic Manager=15.0.0
F5 BIG-IP Analytics>=11.5.2<=11.6.4
F5 BIG-IP Analytics>=12.1.0<=12.1.4
F5 BIG-IP Analytics>=13.1.0<=13.1.1
F5 BIG-IP Analytics>=14.0.0<=14.1.0
F5 BIG-IP Analytics=15.0.0
F5 BIG-IP Edge Gateway>=11.5.2<=11.6.4
F5 BIG-IP Edge Gateway>=12.1.0<=12.1.4
F5 BIG-IP Edge Gateway>=13.1.0<=13.1.1
F5 BIG-IP Edge Gateway>=14.0.0<=14.1.0
F5 BIG-IP Edge Gateway=15.0.0
F5 BIG-IP>=11.5.2<=11.6.4
F5 BIG-IP>=12.1.0<=12.1.4
F5 BIG-IP>=13.1.0<=13.1.1
F5 BIG-IP>=14.0.0<=14.1.0
F5 BIG-IP=15.0.0
Ubuntu=12.04
Ubuntu=14.04
Ubuntu=16.04
Ubuntu=18.04
Ubuntu=18.10
Ubuntu=19.04
Red Hat Enterprise Linux Atomic Host
Red Hat Enterprise Linux=5.0
Red Hat Enterprise Linux=6.0
Red Hat Enterprise Linux=7.0
Red Hat Enterprise Linux=8.0
Red Hat Enterprise Linux=6.5
Red Hat Enterprise Linux=6.6
Red Hat Enterprise Linux Server EUS=7.4
Red Hat Enterprise Linux Server EUS=7.5
Red Hat Enterprise MRG=2.0
Ivanti Pulse Connect Secure
Pulse Policy Secure
Pulse Secure Virtual Application Delivery Controller
F5 Traffix Systems Signaling Delivery Controller>=5.0.0<=5.1.0
Ivanti Pulse Connect Secure
Siemens Simatic Cloud Connect 7 CC712<1.1.5
1.1.5
Siemens ROX<2.13.3
2.13.3
Siemens RUGGEDCOM APE 1404 Linux
Siemens RUGGEDCOM RM1224<6.2
6.2
Siemens RUGGEDCOM RX 1400 VPE Debian Linux
Siemens RUGGEDCOM RX 1400 VPE
Siemens SCALANCE M804PB<6.2
6.2
Siemens Scalance M812-1 ADSL Router<6.2
6.2
Siemens Scalance M812-1 ADSL Router<6.2
6.2
Siemens Scalance M816-1 ADSL-Router Firmware<6.2
6.2
Siemens Scalance M816-1 ADSL-Router Firmware<6.2
6.2
Siemens SCALANCE M826-2 SHDSL-Router<6.2
6.2
Siemens SCALANCE M874-2<6.2
6.2
Siemens SCALANCE M874-3<6.2
6.2
Siemens Scalance M875 Firmware
Siemens SCALANCE M876-3<6.2
6.2
Siemens SCALANCE M876-3<6.2
6.2
Siemens SCALANCE M876-4<6.2
6.2
Siemens SCALANCE M876-4<6.2
6.2
Siemens Scalance S602 Firmware<4.1
4.1
Siemens Scalance S612 Firmware<4.1
4.1
Siemens SCALANCE S615<6.2
6.2
Siemens Scalance S623 Firmware<4.1
4.1
Siemens Scalance S627-2M Firmware<4.1
4.1
Siemens SCALANCE SC622-2C<2.0.1
2.0.1
Siemens SCALANCE SC632-2C<2.0.1
2.0.1
Siemens SCALANCE SC636-2C<2.0.1
2.0.1
Siemens SCALANCE SC642-2C<2.0.1
2.0.1
Siemens SCALANCE SC646-2C<2.0.1
2.0.1
Siemens Scalance W1750D Firmware<8.6.0
8.6.0
Siemens SCALANCE W-700<6.4
6.4
Siemens SCALANCE W1700 IEEE 802.11ac<2.0
2.0
Siemens SCALANCE WLC711
Siemens SCALANCE WLC712
Siemens SIMATIC CM 1542-1 Firmware<3.0
3.0
Siemens SIMATIC CP 343-1 Advanced

Remedy

For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2019-11477?

    CVE-2019-11477 has a high severity rating due to the potential for an integer overflow that could lead to denial of service or code execution.

  • How do I fix CVE-2019-11477?

    To fix CVE-2019-11477, update your Linux kernel to the fixed versions provided by your distribution, such as those specified in Red Hat and Debian advisories.

  • Which versions of the Linux kernel are affected by CVE-2019-11477?

    CVE-2019-11477 affects several Linux kernel versions, specifically versions prior to the vendor-specific patched releases.

  • What exploits are associated with CVE-2019-11477?

    Exploits associated with CVE-2019-11477 may allow attackers to cause denial of service or potentially execute arbitrary code on affected systems.

  • Who is impacted by CVE-2019-11477?

    Users running affected versions of the Linux kernel, especially on servers and devices utilizing TCP, should be aware of the vulnerability and take action to secure their systems.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203