Lucene search

K
redhatcveRedhat.comRH:CVE-2019-11478
HistoryDec 28, 2019 - 3:45 a.m.

CVE-2019-11478

2019-12-2803:45:40
redhat.com
access.redhat.com
16

EPSS

0.966

Percentile

99.6%

An excessive resource consumption flaw was found in the way the Linux kernel’s networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel’s socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.

Mitigation

For mitigation, please refer to the Red Hat Knowledgebase article: <https://access.redhat.com/security/vulnerabilities/tcpsack&gt;