First published: Tue Jul 02 2019(Updated: )
In FreeBSD 12.0-STABLE before r349197 and 12.0-RELEASE before 12.0-RELEASE-p6, a bug in the non-default RACK TCP stack can allow an attacker to cause several linked lists to grow unbounded and cause an expensive list traversal on every packet being processed, leading to resource exhaustion and a denial of service.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =12.0 | |
FreeBSD Kernel | =12.0-p1 | |
FreeBSD Kernel | =12.0-p2 | |
FreeBSD Kernel | =12.0-p3 | |
FreeBSD Kernel | =12.0-p4 | |
FreeBSD Kernel | =12.0-p5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5599 is classified as a high severity vulnerability due to the potential for resource exhaustion and denial of service.
To remediate CVE-2019-5599, update your FreeBSD system to version 12.0-RELEASE-p6 or later.
FreeBSD versions 12.0 through 12.0-RELEASE-p5 are affected by CVE-2019-5599.
CVE-2019-5599 allows attackers to exploit a bug in the RACK TCP stack, leading to denial of service through resource exhaustion.
While updating is the recommended approach, temporarily disabling the RACK TCP stack may help mitigate the issue until a patch is applied.