CVE-2019-11479
Summary
| CVE | CVE-2019-11479 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-06-19 00:15:00 UTC |
| Updated | 2023-11-07 03:03:00 UTC |
| Description | Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363. |
Risk And Classification
Problem Types: CWE-770
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Linux | 14.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 16.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 18.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 18.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 19.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 14.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 16.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 18.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 18.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 19.04 | All | All | All |
| Application | F5 | Big-ip Access Policy Manager | All | All | All | All |
| Application | F5 | Big-ip Access Policy Manager | All | All | All | All |
| Application | F5 | Big-ip Advanced Firewall Manager | All | All | All | All |
| Application | F5 | Big-ip Advanced Firewall Manager | All | All | All | All |
| Application | F5 | Big-ip Analytics | All | All | All | All |
| Application | F5 | Big-ip Analytics | All | All | All | All |
| Application | F5 | Big-ip Application Acceleration Manager | All | All | All | All |
| Application | F5 | Big-ip Application Acceleration Manager | All | All | All | All |
| Application | F5 | Big-ip Application Security Manager | All | All | All | All |
| Application | F5 | Big-ip Application Security Manager | All | All | All | All |
| Application | F5 | Big-ip Domain Name System | All | All | All | All |
| Application | F5 | Big-ip Domain Name System | All | All | All | All |
| Application | F5 | Big-ip Edge Gateway | All | All | All | All |
| Application | F5 | Big-ip Edge Gateway | All | All | All | All |
| Application | F5 | Big-ip Fraud Protection Service | All | All | All | All |
| Application | F5 | Big-ip Fraud Protection Service | All | All | All | All |
| Application | F5 | Big-ip Global Traffic Manager | All | All | All | All |
| Application | F5 | Big-ip Global Traffic Manager | All | All | All | All |
| Application | F5 | Big-ip Link Controller | All | All | All | All |
| Application | F5 | Big-ip Link Controller | All | All | All | All |
| Application | F5 | Big-ip Local Traffic Manager | All | All | All | All |
| Application | F5 | Big-ip Local Traffic Manager | All | All | All | All |
| Application | F5 | Big-ip Policy Enforcement Manager | All | All | All | All |
| Application | F5 | Big-ip Policy Enforcement Manager | All | All | All | All |
| Application | F5 | Big-ip Webaccelerator | All | All | All | All |
| Application | F5 | Big-ip Webaccelerator | All | All | All | All |
| Application | F5 | Big-iq Centralized Management | All | All | All | All |
| Application | F5 | Big-iq Centralized Management | All | All | All | All |
| Application | F5 | Enterprise Manager | 3.1.1 | All | All | All |
| Application | F5 | Enterprise Manager | 3.1.1 | All | All | All |
| Application | F5 | Iworkflow | 2.3.0 | All | All | All |
| Application | F5 | Iworkflow | 2.3.0 | All | All | All |
| Application | F5 | Traffix Sdc | All | All | All | All |
| Application | F5 | Traffix Signaling Delivery Controller | All | All | All | All |
| Operating System | Linux | Linux Kernel | All | All | All | All |
| Operating System | Linux | Linux Kernel | All | All | All | All |
| Operating System | Redhat | Enterprise Linux | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 7.0 | All | All | All |
| Application | Redhat | Virtualization Host | 4.0 | All | All | All |
| Application | Redhat | Virtualization Host | 4.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Linux Kernel TCP SACK Panic Vulnerabilities in NetApp Products | NetApp Product Security | CONFIRM | security.netapp.com | Third Party Advisory |
| Security Advisory | CONFIRM | psirt.global.sonicwall.com | Third Party Advisory |
| Public KB - SA44193 - 2019-06: Out-of-Cycle Advisory: Multiple Linux Kernel and FreeBSD vulnerabilities | CONFIRM | kb.pulsesecure.net | Third Party Advisory |
| Linux Kernel CVE-2019-11479 Denial of Service Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Siemens Industrial Products (Update G) | CISA | MISC | www.us-cert.gov | Third Party Advisory, US Government Resource |
| www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt | CONFIRM | www.arubanetworks.com | Third Party Advisory |
| BD Alaris PCU (Update A) | CISA | MISC | www.us-cert.gov | Third Party Advisory, US Government Resource |
| myF5 | support.f5.com | ||
| USN-4041-1: Linux kernel update | Ubuntu security notices | UBUNTU | usn.ubuntu.com | Third Party Advisory |
| Oracle Critical Patch Update Advisory - October 2020 | MISC | www.oracle.com | |
| USN-4041-2: Linux kernel (HWE) update | Ubuntu security notices | UBUNTU | usn.ubuntu.com | Third Party Advisory |
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf | CONFIRM | cert-portal.siemens.com | Third Party Advisory |
| kernel/git/netdev/net.git - Netdev Group's networking tree | MISC | git.kernel.org | Mailing List, Patch, Vendor Advisory |
| TCP SACK PANIC - Kernel vulnerabilities - CVE-2019-11477, CVE-2019-11478 & CVE-2019-11479 - Red Hat Customer Portal | MISC | access.redhat.com | Third Party Advisory |
| oss-security - Re: linux-distros membership application - Microsoft | MLIST | www.openwall.com | Mailing List, Third Party Advisory |
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| oss-security - Re: linux-distros membership application - Microsoft | MLIST | www.openwall.com | Mailing List, Third Party Advisory |
| support.f5.com/csp/article/K35421172 | CONFIRM | support.f5.com | Third Party Advisory |
| Synology Inc. | CONFIRM | www.synology.com | Third Party Advisory |
| McAfee Security Bulletin – Updates for Linux kernel TCP Sad SACK vulnerability (CVE-2019-11477, CVE-2019-11478, CVE-2019-11479) | CONFIRM | kc.mcafee.com | Third Party Advisory |
| kernel/git/netdev/net.git - Netdev Group's networking tree | MISC | git.kernel.org | Mailing List, Patch, Vendor Advisory |
| VU#905115 - Multiple TCP Selective Acknowledgement (SACK) and Maximum Segment Size (MSS) networking vulnerabilities may cause denial-of-service conditions in Linux and FreeBSD kernels | CERT-VN | www.kb.cert.org | Third Party Advisory, US Government Resource |
| Oracle Critical Patch Update Advisory - January 2020 | MISC | www.oracle.com | Third Party Advisory |
| SecurityTeam/KnowledgeBase/SACKPanic - Ubuntu Wiki | MISC | wiki.ubuntu.com | Mitigation, Third Party Advisory |
| oss-security - Re: linux-distros membership application - Microsoft | MLIST | www.openwall.com | Mailing List, Third Party Advisory |
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| support.f5.com/csp/article/K35421172 | CONFIRM | support.f5.com | Third Party Advisory |
| security-bulletins/2019-001.md at master · Netflix/security-bulletins · GitHub | MISC | github.com | Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Jonathan Looney from Netflix