| Summary | Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363. |
|---|---|
| Publication Date | June 19, 2019, 9:15 a.m. |
| Registration Date | Jan. 26, 2021, 11:38 a.m. |
| Last Update | Nov. 21, 2024, 1:21 p.m. |
| CVSS3.1 : HIGH | |
| スコア | 7.5 |
|---|---|
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 高 |
| CVSS2.0 : MEDIUM | |
| Score | 5.0 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:N/I:N/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.4 | 4.4.182 | |||
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.9 | 4.9.182 | |||
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14 | 4.14.127 | |||
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19 | 4.19.52 | |||
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.1 | 5.1.11 | |||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 14.0.0 | 14.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 13.1.0 | 13.1.3.2 | |||
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 15.0.0 | 15.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 11.5.2 | 11.6.5.1 | |||
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 12.1.0 | 12.1.5.1 | |||
| cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* | 14.1.2 | 14.1.2.1 | |||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 14.0.0 | 14.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 13.1.0 | 13.1.3.2 | |||
| cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 15.0.0 | 15.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 11.5.2 | 11.6.5.1 | |||
| cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 12.1.0 | 12.1.5.1 | |||
| cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* | 14.1.2 | 14.1.2.1 | |||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 14.0.0 | 14.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 13.1.0 | 13.1.3.2 | |||
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 15.0.0 | 15.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 11.5.2 | 11.6.5.1 | |||
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 12.1.0 | 12.1.5.1 | |||
| cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* | 14.1.2 | 14.1.2.1 | |||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* | 14.0.0 | 14.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* | 13.1.0 | 13.1.3.2 | |||
| cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* | 15.0.0 | 15.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* | 11.5.2 | 11.6.5.1 | |||
| cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* | 12.1.0 | 12.1.5.1 | |||
| cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* | 14.1.2 | 14.1.2.1 | |||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* | 14.0.0 | 14.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* | 13.1.0 | 13.1.3.2 | |||
| cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* | 15.0.0 | 15.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* | 11.5.2 | 11.6.5.1 | |||
| cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* | 12.1.0 | 12.1.5.1 | |||
| cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* | 14.1.2 | 14.1.2.1 | |||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* | 14.0.0 | 14.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* | 13.1.0 | 13.1.3.2 | |||
| cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* | 15.0.0 | 15.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* | 11.5.2 | 11.6.5.1 | |||
| cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* | 12.1.0 | 12.1.5.1 | |||
| cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* | 14.1.2 | 14.1.2.1 | |||
| Configuration8 | or higher | or less | more than | less than | |
| cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 14.0.0 | 14.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 13.1.0 | 13.1.3.2 | |||
| cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 15.0.0 | 15.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 11.5.2 | 11.6.5.1 | |||
| cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 12.1.0 | 12.1.5.1 | |||
| cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* | 14.1.2 | 14.1.2.1 | |||
| Configuration9 | or higher | or less | more than | less than | |
| cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* | 14.0.0 | 14.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* | 13.1.0 | 13.1.3.2 | |||
| cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* | 15.0.0 | 15.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* | 11.5.2 | 11.6.5.1 | |||
| cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* | 12.1.0 | 12.1.5.1 | |||
| cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* | 14.1.2 | 14.1.2.1 | |||
| Configuration10 | or higher | or less | more than | less than | |
| cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* | 14.0.0 | 14.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* | 13.1.0 | 13.1.3.2 | |||
| cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* | 15.0.0 | 15.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* | 11.5.2 | 11.6.5.1 | |||
| cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* | 12.1.0 | 12.1.5.1 | |||
| cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* | 14.1.2 | 14.1.2.1 | |||
| Configuration11 | or higher | or less | more than | less than | |
| cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* | 14.0.0 | 14.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* | 13.1.0 | 13.1.3.2 | |||
| cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* | 15.0.0 | 15.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* | 11.5.2 | 11.6.5.1 | |||
| cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* | 12.1.0 | 12.1.5.1 | |||
| cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* | 14.1.2 | 14.1.2.1 | |||
| Configuration12 | or higher | or less | more than | less than | |
| cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 14.0.0 | 14.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 13.1.0 | 13.1.3.2 | |||
| cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 15.0.0 | 15.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 11.5.2 | 11.6.5.1 | |||
| cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 12.1.0 | 12.1.5.1 | |||
| cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* | 14.1.2 | 14.1.2.1 | |||
| Configuration13 | or higher | or less | more than | less than | |
| cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* | 14.0.0 | 14.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* | 13.1.0 | 13.1.3.2 | |||
| cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* | 15.0.0 | 15.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* | 11.5.2 | 11.6.5.1 | |||
| cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* | 12.1.0 | 12.1.5.1 | |||
| cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* | 14.1.2 | 14.1.2.1 | |||
| Configuration14 | or higher | or less | more than | less than | |
| cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* | 14.0.0 | 14.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* | 13.1.0 | 13.1.3.2 | |||
| cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* | 15.0.0 | 15.0.1.1 | |||
| cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* | 11.5.2 | 11.6.5.1 | |||
| cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* | 12.1.0 | 12.1.5.1 | |||
| cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* | 14.1.2 | 14.1.2.1 | |||
| Configuration15 | or higher | or less | more than | less than | |
| cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* | |||||
| cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* | |||||
| cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* | |||||
| Configuration16 | or higher | or less | more than | less than | |
| cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* | |||||
| Configuration17 | or higher | or less | more than | less than | |
| cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:* | 5.0.0 | 5.1.0 | |||
| cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:* | 5.1.0 | 5.4.0 | |||
| cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:* | 6.0.0 | 6.1.0 | |||
| cpe:2.3:a:f5:iworkflow:2.3.0:*:*:*:*:*:*:* | |||||
| Configuration18 | or higher | or less | more than | less than | |
| cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* | ||||
| Title | Linux Kernel におけるリソースの枯渇に関する脆弱性 |
|---|---|
| Summary | Linux Kernel には、リソースの枯渇に関する脆弱性が存在します。 |
| Possible impacts | サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | June 15, 2019, midnight |
| Registration Date | June 25, 2019, 12:19 p.m. |
| Last Update | June 23, 2020, 10:26 a.m. |
| レッドハット |
| Red Hat Enterprise Linux |
| Red Hat Enterprise Linux AUS |
| Red Hat Enterprise Linux EUS |
| Red Hat Enterprise Linux Atomic Host |
| Red Hat Enterprise MRG |
| Red Hat Virtualization |
| 日立 |
| Hitachi Virtual Storage Platform 5100 |
| Hitachi Virtual Storage Platform 5100H |
| Hitachi Virtual Storage Platform 5500 |
| Hitachi Virtual Storage Platform 5500H |
| Hitachi Virtual Storage Platform F350 |
| Hitachi Virtual Storage Platform F370 |
| Hitachi Virtual Storage Platform F400 |
| Hitachi Virtual Storage Platform F600 |
| Hitachi Virtual Storage Platform F700 |
| Hitachi Virtual Storage Platform F800 |
| Hitachi Virtual Storage Platform F900 |
| Hitachi Virtual Storage Platform G100 |
| Hitachi Virtual Storage Platform G130 |
| Hitachi Virtual Storage Platform G150 |
| Hitachi Virtual Storage Platform G200 |
| Hitachi Virtual Storage Platform G350 |
| Hitachi Virtual Storage Platform G370 |
| Hitachi Virtual Storage Platform G400 |
| Hitachi Virtual Storage Platform G600 |
| Hitachi Virtual Storage Platform G700 |
| Hitachi Virtual Storage Platform G800 |
| Hitachi Virtual Storage Platform G900 |
| Hitachi Virtual Storage Platform N400 |
| Hitachi Virtual Storage Platform N600 |
| Hitachi Virtual Storage Platform N800 |
| Canonical |
| Ubuntu |
| F5 Networks |
| BIG-IP Access Policy Manager (APM) |
| BIG-IP Advanced Firewall Manager (AFM) |
| BIG-IP Analytics |
| BIG-IP Application Acceleration Manager (AAM) |
| BIG-IP Application Security Manager (ASM) |
| BIG-IP Domain Name System (DNS) |
| BIG-IP Edge Gateway |
| BIG-IP Fraud Protection Service (FPS) |
| BIG-IP Global Traffic Manager (GTM) |
| BIG-IP Link Controller |
| BIG-IP Local Traffic Manager (LTM) |
| BIG-IP Policy Enforcement Manager (PEM) |
| BIG-IP WebAccelerator |
| Linux |
| Linux Kernel |
| パルスセキュア |
| Pulse Connect Secure |
| Pulse Policy Secure |
| Pulse Virtual Application Delivery Controller |
| No | Changed Details | Date of change |
|---|---|---|
| 3 | [2020年02月14日] 影響を受けるシステム:内容を更新 ベンダ情報:日立ストレージソリューションセキュリティ情報 (hitachi-sec-2020-303) を追加 ベンダ情報:Hitachi Storage Solutions Vulnerability Information (hitachi-sec-2020-303) を追加 |
Feb. 14, 2020, 2:20 p.m. |
| 4 | [2020年06月19日] 参考情報:ICS-CERT ADVISORY (ICSMA-20-170-06) を追加 |
June 19, 2020, 3:17 p.m. |
| 1 | [2019年06月25日] 掲載 |
June 25, 2019, 12:19 p.m. |
| 2 | [2019年09月11日] 参考情報:ICS-CERT ADVISORY (ICSA-19-253-03) を追加 |
Sept. 11, 2019, 2:14 p.m. |
| 5 | [2020年06月23日] 参考情報:JVN (JVNVU#93229773) を追加 |
June 23, 2020, 10:14 a.m. |