vulnerability
SUSE: CVE-2019-18805: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Nov 7, 2019 | Nov 13, 2019 | Feb 4, 2022 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Nov 7, 2019
Added
Nov 13, 2019
Modified
Feb 4, 2022
Description
An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.
Solution(s)
suse-upgrade-kernel-azure-basesuse-upgrade-kernel-defaultsuse-upgrade-kernel-default-extrasuse-upgrade-kernel-default-mansuse-upgrade-kernel-devel-azuresuse-upgrade-kernel-docssuse-upgrade-kernel-obs-buildsuse-upgrade-kernel-source-azure
References
- SUSE-SUSE-SU-2019:2951-1
- SUSE-SUSE-SU-2019:2953-1
- SUSE-SUSE-SU-2019:2984-1
- SUSE-SUSE-SU-2019:3200-1
- SUSE-SUSE-SU-2019:3294-1
- SUSE-SUSE-SU-2019:3295-1
- SUSE-SUSE-SU-2019:3317-1
- SUSE-SUSE-SU-2019:3371-1
- SUSE-SUSE-SU-2019:3372-1
- SUSE-SUSE-SU-2019:3379-1
- SUSE-SUSE-SU-2019:3381-1
- SUSE-SUSE-SU-2020:0093-1
- NVD-CVE-2019-18805

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.