Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

CVE-2019-11478

PUBLISHED 16.09.2024

CNA: canonical

SACK can cause extensive memory use via fragmented resend queue

Обновлено: 20.10.2020
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.

CWE

Идентификатор Описание
CWE-770 The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.

БДУ ФСТЭК

Идентификатор Описание
BDU:2019-02195 Уязвимость механизма TCP Selective Acknowledgement ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS

Оценка Severity Версия Базовый вектор
5.3 MEDIUM 3.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Доп. Информация

Product Status

Linux kernel
Product: Linux kernel
Vendor: Linux
Default status: Не определен
Версии:
Затронутые версии Статус
Наблюдалось в версиях от 4.4 до 4.4.182 affected
Наблюдалось в версиях от 4.9 до 4.9.182 affected
Наблюдалось в версиях от 4.14 до 4.14.127 affected
Наблюдалось в версиях от 4.19 до 4.19.52 affected
Наблюдалось в версиях от 5.1 до 5.1.11 affected
 

Ссылки

https://www.kb.cert.org/vuls/id/905115
https://access.redhat.com/errata/RHSA-2019:1594
https://access.redhat.com/errata/RHSA-2019:1602
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
https://access.redhat.com/errata/RHSA-2019:1699
https://seclists.org/bugtraq/2019/Jul/30
http://www.openwall.com/lists/oss-security/2019/10/24/1
http://www.openwall.com/lists/oss-security/2019/10/29/3
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic
https://access.redhat.com/security/vulnerabilities/tcpsack
http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193
https://www.synology.com/security/advisory/Synology_SA_19_28
https://security.netapp.com/advisory/ntap-20190625-0001/
https://kc.mcafee.com/corporate/index?page=content&id=SB10287
http://www.vmware.com/security/advisories/VMSA-2019-0010.html
https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf
https://www.us-cert.gov/ics/advisories/icsa-19-253-03
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e
https://support.f5.com/csp/article/K26618426
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0007
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html

CVE Program Container

Обновлено: 04.08.2024
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.

Ссылки

https://www.kb.cert.org/vuls/id/905115
https://access.redhat.com/errata/RHSA-2019:1594
https://access.redhat.com/errata/RHSA-2019:1602
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
https://access.redhat.com/errata/RHSA-2019:1699
https://seclists.org/bugtraq/2019/Jul/30
http://www.openwall.com/lists/oss-security/2019/10/24/1
http://www.openwall.com/lists/oss-security/2019/10/29/3
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic
https://access.redhat.com/security/vulnerabilities/tcpsack
http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193
https://www.synology.com/security/advisory/Synology_SA_19_28
https://security.netapp.com/advisory/ntap-20190625-0001/
https://kc.mcafee.com/corporate/index?page=content&id=SB10287
http://www.vmware.com/security/advisories/VMSA-2019-0010.html
https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf
https://www.us-cert.gov/ics/advisories/icsa-19-253-03
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e
https://support.f5.com/csp/article/K26618426
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0007
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.