Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-11479
HistoryJun 17, 2019 - 12:00 a.m.

CVE-2019-11479

2019-06-1700:00:00
ubuntu.com
ubuntu.com
29

0.974 High

EPSS

Percentile

99.9%

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded
to 48 bytes. This allows a remote peer to fragment TCP resend queues
significantly more than if a larger MSS were enforced. A remote attacker
could use this to cause a denial of service. This has been fixed in stable
kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed
in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and
5f3e2bf008c2221478101ee72f5cb4654b9fc363.

Bugs

Notes

Author Note
tyhicks This issue is primarily due to the TCP spec not defining a minimum value for the Minimum Segment Size (MSS). The Linux kernel cannot safely put a restriction on the MSS because it may break valid TCP connections. This issue will be addressed by allowing a system administrator to raise the smallest acceptable MSS value but there will be no default mitigation by default.
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchlinux< 4.15.0-54.58UNKNOWN
ubuntu18.10noarchlinux< 4.18.0-25.26UNKNOWN
ubuntu19.04noarchlinux< 5.0.0-20.21UNKNOWN
ubuntu16.04noarchlinux< 4.4.0-154.181UNKNOWN
ubuntu18.04noarchlinux-aws< 4.15.0-1043.45UNKNOWN
ubuntu18.10noarchlinux-aws< 4.18.0-1020.24UNKNOWN
ubuntu19.04noarchlinux-aws< 5.0.0-1010.11UNKNOWN
ubuntu14.04noarchlinux-aws< 4.4.0-1048.52) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchlinux-aws< 4.4.0-1087.98UNKNOWN
ubuntu16.04noarchlinux-aws-hwe< 4.15.0-1043.45~16.04.1UNKNOWN
Rows per page:
1-10 of 441