Show filters
2 Total Results
Displaying 1-2 of 2
Sort by:
Attacker Value
Very Low

TCP SACK PANIC

Last updated February 13, 2020
A Linux kernel vulnerability in TCP networking could allow DoS > CVE-2019-11477 is considered an Important severity, whereas CVE-2019-11478 and CVE-2019-11479 are considered a Moderate severity. The first two are related to the Selective Acknowledgement (SACK) packets combined with Maximum Segment Size (MSS), the third solely with the Maximum Segment Size (MSS). Vulnerable code exists in https://github.com/torvalds/linux/blob/master/include/linux/skbuff.h This might stick around in various embedded hardware, which could be more disasterous if DoS'ed, but it's too early to tell.
0
Attacker Value
Unknown

CVE-2019-11479

Disclosure Date: June 19, 2019 (last updated November 08, 2023)
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.