CVE-2019-11479

Related Vulnerabilities: CVE-2019-11479  

Impact: Moderate Public Date: 2019-06-17 CWE: CWE-400 Bugzilla: 1719129: CVE-2019-11479 Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service An excessive resource consumption flaw was found in the way the Linux kernel's networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel's resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.

An excessive resource consumption flaw was found in the way the Linux kernel's networking subsystem processed TCP segments. If the Maximum Segment Size (MSS) of a TCP connection was set to low values, such as 48 bytes, it can leave as little as 8 bytes for the user data, which significantly increases the Linux kernel's resource (CPU, Memory, and Bandwidth) utilization. A remote attacker could use this flaw to cause a denial of service (DoS) by repeatedly sending network traffic on a TCP connection with low TCP MSS.

Find out more about CVE-2019-11479 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack

Red Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 5.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact None
Availability Impact Low

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux Update Services for SAP Solutions 7.3 (kernel) RHSA-2019:1484 2019-06-17
Red Hat Enterprise Linux Extended Update Support 7.5 (kernel) RHSA-2019:1482 2019-06-17
Red Hat Enterprise Linux 8 (kernel) RHSA-2019:1479 2019-06-17
Red Hat Enterprise Linux Advanced Update Support 7.3 (kernel) RHSA-2019:1484 2019-06-17
Red Hat Enterprise Linux 7.3 Telco Extended Update Support (kernel) RHSA-2019:1484 2019-06-17
Red Hat Enterprise Linux Advanced Update Support 7.2 (kernel) RHSA-2019:1485 2019-06-17
Red Hat Enterprise Linux 8 (kernel) RHSA-2019:1479 2019-06-17
Red Hat Enterprise Linux 6 (kernel) RHSA-2019:1488 2019-06-17
Red Hat Enterprise Linux 7 (kernel) RHSA-2019:1481 2019-06-17
Red Hat Enterprise Linux Advanced Update Support 6.6 (kernel) RHSA-2019:1489 2019-06-17
Red Hat Enterprise Linux Extended Update Support 7.4 (kernel) RHSA-2019:1483 2019-06-17
Red Hat Enterprise Linux Server Update Services for SAP Solutions 7.2 (kernel) RHSA-2019:1485 2019-06-17
Red Hat Enterprise Linux Advanced Update Support 6.5 (kernel) RHSA-2019:1490 2019-06-17
Red Hat Enterprise Linux Server TUS (v. 7.2) (kernel) RHSA-2019:1485 2019-06-17

Affected Packages State

Platform Package State
Red Hat Virtualization 4 redhat-virtualization-host Affected
Red Hat OpenShift Container Platform 4.1 kernel Affected
Red Hat Enterprise MRG 2 kernel-rt Affected
Red Hat Enterprise Linux 8 kernel-rt Affected
Red Hat Enterprise Linux 7 kernel-alt Affected
Red Hat Enterprise Linux 7 kernel-rt Affected
Red Hat Enterprise Linux 5 kernel Out of support scope

Acknowledgements

Red Hat would like to thank Jonathan Looney (Netflix Information Security) for reporting this issue.

Mitigation

For mitigation, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/tcpsack

External References