Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-11477— Integer overflow in TCP_SKB_CB(skb)->tcp_gso_segs

EPSS 69.92% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-11477

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Integer overflow in TCP_SKB_CB(skb)->tcp_gso_segs
Source: NVD (National Vulnerability Database)
Vulnerability Description
Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
整数溢出或超界折返
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel中的网络子系统处理TCP Selective Acknowledgment (SACK)片段的方法存在输入验证错误漏洞。攻击者可利用该漏洞造成拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux kernel 4.4 ~ 4.4.182 -

II. Public POCs for CVE-2019-11477

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/sasqwatch/cve-2019-11477-pocPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-11477

登录查看更多情报信息。

Same Patch Batch · Linux · 2019-06-18 · 3 CVEs total

CVE-2019-11478SACK can cause extensive memory use via fragmented resend queue
CVE-2019-11479Linux kernel 资源管理错误漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2019-11477

No comments yet


Leave a comment