Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

CVE-2019-11477

PUBLISHED 17.09.2024

CNA: canonical

Integer overflow in TCP_SKB_CB(skb)->tcp_gso_segs

Обновлено: 20.10.2020
Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

CWE

Идентификатор Описание
CWE-190 The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.

БДУ ФСТЭК

Идентификатор Описание
BDU:2019-02194 Уязвимость механизма TCP Selective Acknowledgement ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS

Оценка Severity Версия Базовый вектор
7.5 HIGH 3.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Доп. Информация

Product Status

Linux kernel
Product: Linux kernel
Vendor: Linux
Default status: Не определен
Версии:
Затронутые версии Статус
Наблюдалось в версиях от 4.4 до 4.4.182 affected
Наблюдалось в версиях от 4.9 до 4.9.182 affected
Наблюдалось в версиях от 4.14 до 4.14.127 affected
Наблюдалось в версиях от 4.19 до 4.19.52 affected
Наблюдалось в версиях от 5.1 до 5.1.11 affected
 

Ссылки

https://www.kb.cert.org/vuls/id/905115
http://www.openwall.com/lists/oss-security/2019/06/20/3
https://access.redhat.com/errata/RHSA-2019:1594
https://access.redhat.com/errata/RHSA-2019:1602
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
https://access.redhat.com/errata/RHSA-2019:1699
http://www.openwall.com/lists/oss-security/2019/10/24/1
http://www.openwall.com/lists/oss-security/2019/10/29/3
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic
https://access.redhat.com/security/vulnerabilities/tcpsack
https://support.f5.com/csp/article/K78234183
http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193
https://www.synology.com/security/advisory/Synology_SA_19_28
https://security.netapp.com/advisory/ntap-20190625-0001/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006
https://kc.mcafee.com/corporate/index?page=content&id=SB10287
http://www.vmware.com/security/advisories/VMSA-2019-0010.html
https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf
https://www.us-cert.gov/ics/advisories/icsa-19-253-03
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt

CVE Program Container

Обновлено: 04.08.2024
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.

Ссылки

https://www.kb.cert.org/vuls/id/905115
http://www.openwall.com/lists/oss-security/2019/06/20/3
https://access.redhat.com/errata/RHSA-2019:1594
https://access.redhat.com/errata/RHSA-2019:1602
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
https://access.redhat.com/errata/RHSA-2019:1699
http://www.openwall.com/lists/oss-security/2019/10/24/1
http://www.openwall.com/lists/oss-security/2019/10/29/3
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic
https://access.redhat.com/security/vulnerabilities/tcpsack
https://support.f5.com/csp/article/K78234183
http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193
https://www.synology.com/security/advisory/Synology_SA_19_28
https://security.netapp.com/advisory/ntap-20190625-0001/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006
https://kc.mcafee.com/corporate/index?page=content&id=SB10287
http://www.vmware.com/security/advisories/VMSA-2019-0010.html
https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf
https://www.us-cert.gov/ics/advisories/icsa-19-253-03
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.