CVE-2019-11478
CWE-770 — Allocation without LimitsCWE-400 — Uncontrolled Resource Consumption17 documents11 sources
Severity
7.5HIGH
EPSS
29.8%
top 3.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 19
Latest updateMay 24
Description
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4
Affected Packages29 packages
Also affects: Ubuntu Linux 12.04, 14.04, 16.04, 18.04, 18.10, 19.04, Enterprise Linux 5.0, 6.0, 7.0, 8.0, 6.5, 6.6, 7.4, 7.5
Patches
🔴Vulnerability Details
7GHSA▶
GHSA-xh2h-cw6h-x9h5: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling cert↗2022-05-24
OSV▶
CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling cert↗2019-06-19
OSV▶
linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities↗2019-06-17
📋Vendor Advisories
5VMware▶
VMware product updates address Linux kernel vulnerabilities in TCP Selective Acknowledgement (SACK) (CVE-2019-11477, CVE-2019-11478)↗2019-07-02
Red Hat▶
Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service↗2019-06-17
Debian▶
CVE-2019-11478: linux - Jonathan Looney discovered that the TCP retransmission queue implementation in t...↗2019