Lucene search

K
redhatcveRedhat.comRH:CVE-2019-18805
HistoryJan 05, 2020 - 4:06 a.m.

CVE-2019-18805

2020-01-0504:06:44
redhat.com
access.redhat.com
34

0.007 Low

EPSS

Percentile

80.4%

A flaw was reported in the Linux kernel’s TCP subsystem while calculating a packet round trip time, when a sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) is set incorrectly. This causes an integer overflow which can lead to a denial Of service (DOS) attack.

Mitigation

This flaw can be mitigated by setting the sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) with 300 which means the packet time will not exceed more then 5 minutes and which should not cause an integer overflow.