Wind River Support Network

HomeDefectsSCP7-1021
Fixed

SCP7-1021 : Security Advisory - Linux - CVE-2019-11478

Created: Jun 19, 2019    Updated: Sep 17, 2019
Resolved Date: Sep 17, 2019
Previous ID: LIN7-11075
Found In Version: 7.0.0.30
Severity: Standard
Applicable for: Wind River Linux 7
Component/s: Kernel

Description

An excessive resource consumption flaw was found in the way the Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented, which leads to increased resource utilization to traverse and process these fragments as further SACK segments are received on the same TCP connection. A remote attacker could use this flaw to cause a denial of service (DoS) by sending a crafted sequence of SACK segments on a TCP connection.

CREATE(Triage): {Link=https://nvd.nist.gov/vuln/detail/CVE-2019-11478 User=mhatle}
Live chat
Online