CVE-2019-11477 log
Source |
|
Severity | High |
Remote | Yes |
Type | Denial of service |
Description | An integer overflow has been discovered in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A sequence of SACKs may be crafted such that one can trigger a kernel panic. A remote attacker could use this to cause a denial of service (system crash). |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-986 | linux-hardened | 5.1.10.a-1 | 5.1.11.a-1 | High | Fixed | |
AVG-985 | linux-zen | 5.1.10.zen1-1 | 5.1.11.zen1-1 | High | Fixed | |
AVG-984 | linux-lts | 4.19.51-1 | 4.19.52-1 | High | Fixed | |
AVG-983 | linux | 5.1.10.arch1-1 | 5.1.11.arch1-1 | High | Fixed |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
18 Jun 2019 | ASA-201906-15 | AVG-985 | linux-zen | High | denial of service |
18 Jun 2019 | ASA-201906-14 | AVG-984 | linux-lts | High | denial of service |
18 Jun 2019 | ASA-201906-13 | AVG-983 | linux | High | denial of service |
17 Jun 2019 | ASA-201906-12 | AVG-986 | linux-hardened | High | denial of service |
Notes |
---|
Workaround: $ sudo sysctl -w net.ipv4.tcp_sack=0 net.ipv4.tcp_sack = 0 IMPORTANT: The sysctl modification shown above is not persistent across reboots |