CVE: integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs)
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
StarlingX |
Fix Released
|
High
|
zhao.shuai |
Bug Description
Brief Description
-----------------
Security Vulnerability(es):
An integer overflow flaw was found in the way the Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477)
Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)
Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)
Redhat Description:
https:/
https:/
kernel:
http://
CVE References
Changed in starlingx: | |
assignee: | nobody → zhao.shuai (zhao.shuai) |
Changed in starlingx: | |
status: | In Progress → Fix Released |
information type: | Private Security → Public Security |
summary: |
- integer overflow in the Linux kernel when handling TCP Selective + CVE: integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs) |
Regarding kernel minor version upgrade which we discussed in the meeting,
we've reached consensus with Ken Young and other security team members:
For the below two options we had:
Option#1: upgrade the kernel 21.3 in the master only;
Option#2: only cherry pick the security patch to address CVE-11477.
Conclusion is that we will stick with Option#1: put the kernel upgrade
into master after RC1 branched out; then we continue to do testing on master;
if everything goes well, we can cherry pick the patches to release branch.
continue the upgrade in master with Workflow -1 for now till RC1.
Option#1 Patches: /review. opendev. org/#/c/ 670856/ /review. opendev. org/#/c/ 670870/ /review. opendev. org/#/c/ 670869/
https:/
https:/
https:/
Option#2 Patches: /review. opendev. org/#/c/ 670711/
https:/