#VU18813 Integer overflow in Linux kernel - CVE-2019-11477
Published: June 17, 2019 / Updated: May 30, 2020
Linux kernel
Linux Foundation
Description
The vulnerability allows a remote attacker to perform denial of service (DoS) attack.
The vulnerability exists due to integer overflow when handling TCP Selective Acknowledgments (SACKs) due to incorrect processing of TCP_SKB_CB(skb)->tcp_gso_segs value in Linux kernel. A remote non-authenticated attacker can send specially crafted network traffic to the affected system, trigger integer overflow and render the system unavailable.
Successful exploitation of the vulnerability allows a remote attacker to perform denial of service (DoS) attack.
Remediation
Update your kernel to the latest version.
External links
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.182
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.182
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.127
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.52
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.11
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2