hshivhare67 / Kernel_v3.0.35

Other
0 stars 0 forks source link

CVE-2019-18805 (Critical) detected in linuxlinux-3.0.40 #906

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2019-18805 - Critical Severity Vulnerability

Vulnerable Library - linuxlinux-3.0.40

Apache Software Foundation (ASF)

Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/?wsslib=linux

Found in HEAD commit: 22324ae9738f0a1eeb173ff05137c8317c350189

Found in base branch: master

Vulnerable Source Files (1)

/net/ipv4/sysctl_net_ipv4.c

Vulnerability Details

An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.

Publish Date: 2019-11-07

URL: CVE-2019-18805

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18805

Release Date: 2019-11-07

Fix Resolution: v5.1-rc7


Step up your Open Source Security Game with Mend here