An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
History
No history.
Information
Published : 2019-11-07 14:15
Updated : 2024-11-21 04:33
NVD link : CVE-2019-18805
Mitre link : CVE-2019-18805
CVE.ORG link : CVE-2019-18805
JSON object : View
Products Affected
netapp
- h610s
- hci_compute_node
- aff_a400_firmware
- fas8300
- fas8700_firmware
- fas8700
- solidfire
- hci_storage_node
- active_iq_unified_manager
- data_availability_services
- aff_a400
- h610s_firmware
- aff_a700s
- hci_management_node
- steelstore_cloud_integrated_storage
- e-series_santricity_os_controller
- aff_a700s_firmware
- fas8300_firmware
linux
- linux_kernel
redhat
- enterprise_linux
broadcom
- fabric_operating_system
opensuse
- leap
CWE
CWE-190
Integer Overflow or Wraparound