First published: Tue Apr 16 2019(Updated: )
A flaw was reported in kernel TCP subsystem while calculating a packet round trip time, when a sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) when is set wrongly. This causes an integer over flaw which can lead to a Denial Of Service (DOS) attack. Additional Information: ----------------------- <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19fad20d15a6494f47f85d869f00b11343ee5c78">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19fad20d15a6494f47f85d869f00b11343ee5c78</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-alt | <0:4.14.0-115.18.1.el7a | 0:4.14.0-115.18.1.el7a |
redhat/kernel-rt | <0:4.18.0-193.rt13.51.el8 | 0:4.18.0-193.rt13.51.el8 |
redhat/kernel | <0:4.18.0-193.el8 | 0:4.18.0-193.el8 |
Linux Linux kernel | >=4.4<4.4.180 | |
Linux Linux kernel | >=4.9<4.9.172 | |
Linux Linux kernel | >=4.14<4.14.115 | |
Linux Linux kernel | >=4.19<4.19.38 | |
Linux Linux kernel | >=5.0<5.0.11 | |
Linux Linux kernel | =5.1-rc1 | |
Linux Linux kernel | =5.1-rc2 | |
Linux Linux kernel | =5.1-rc3 | |
Linux Linux kernel | =5.1-rc4 | |
Linux Linux kernel | =5.1-rc5 | |
Linux Linux kernel | =5.1-rc6 | |
Linux Linux kernel | =5.1-rc7 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Redhat Enterprise Linux | =7.0 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Data Availability Services | ||
NetApp E-Series SANtricity OS Controller | >=11.0.0<=11.60.3 | |
Netapp Hci Management Node | ||
Netapp Solidfire | ||
Netapp Steelstore Cloud Integrated Storage | ||
Netapp Hci Compute Node | ||
Netapp Hci Storage Node | ||
Broadcom Fabric Operating System | ||
Netapp Aff A700s Firmware | ||
NetApp AFF A700s | ||
Netapp Fas8300 Firmware | ||
Netapp Fas8300 | ||
Netapp Fas8700 Firmware | ||
Netapp Fas8700 | ||
Netapp Aff A400 Firmware | ||
Netapp Aff A400 | ||
Netapp H610s Firmware | ||
Netapp H610s |
This flaw can be mitigated by setting the sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) with 300 which means the packet time will not exceed more then 5 minutes and which should not cause an integer overflow.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2019-18805 is critical with a CVSS score of 9.8.
CVE-2019-18805 affects the Linux Kernel versions before 5.0.11.
CVE-2019-18805 can lead to a denial of service or possibly unspecified impact.
To fix CVE-2019-18805, update your Linux Kernel to version 5.0.11 or later.
More information about CVE-2019-18805 can be found on the official Linux Kernel Git repository, Red Hat Bugzilla, and Red Hat Errata.