Home > News content

Early Warning | Linux explodes TCP "SACK Panic" vulnerability! N Home Recruitment

via:博客园     time:2019/6/19 22:42:45     readed:159

Netflix finds multiple in the Linux and FreeBSD kernel TCP stacks

Organizations that use Linux computers extensively in production environments need to urgently patch several new patches in order to prevent remote attacks from causing system crashes. There are three flaws affecting the way the Linux kernel handles TCP networks, and one affecting the FreeBSD TCP stack.

CVE-2019-11477 is the four most serious defects, known as

A remote attacker can exploit this vulnerability to trigger a Kernel panic that could cause a computer crash, thereby causing a denial of service. It affects Linux kernel version 2.6.29 and higher than 2.6.29.

Netflix posted BUG details on Github and characterized them as extremely serious vulnerabilities. Red Riding Hood (RedHat) himself rated SACK Panic as serious, and the rest of the error was considered to be

However, Netflix's heavy rating of these BUGs would be appropriate if remote attackers could capture the Linux hosts hosted by the streaming giant hosted on the Amazon Cloud (AWS) infrastructure.

data-ratio=0.4584450402144772

AWS official website

In this regard, AWS has released three updates (), AWS Elastic Beanstalk, Amazon Linux, and Linux-based EC2 instances. Amazon Linux Workspaces and Amazon's Kubernetes container services will be affected by these BUGs.

Some services, such as Amazon Elastic Cache, will not be successful if they use the default configuration, but will be affected if the user changes the default configuration.

Several other BUGs, including CVE-2019011478, also known as SACK Slowness, affect systems with Linux kernels below version 4.15; FreeBSD12 is affected by another SACK Slowness vulnerability, CVE-2019-5599; CVE-2019-11479 can lead to excessive resource consumption of the system.

These three linux defects are related to and affected by how the kernel handles TCP SACK packets with low maximum message segment length (MSS). In its announcement, RedHat noted that the impact was limited to

SACK is a mechanism for improving network inefficiency caused by TCP packet loss between sender and receiver.

Engineers who drafted the IETF standard for SACK explained:

According to Red Hat, since the data structure used in Linux TCP implementation is called socket buffer (SKB), the data structure can accommodate up to 17 packet data fragments, which may cause system crash.

Once SKB reaches the upper limit, the result may be a Kernel panic event. Another factor is the maximum message segment length (MSS), or the maximum size parameter specifying the maximum number of data to be loaded, which specifies the total amount of data contained in the reconstructed TCP segment. Or the maximum size parameter for the maximum number of data to be loaded, which is used to specify the total amount of data contained in the reconstructed TCP segment.

data-ratio=0.39106145251396646

RedHat explained,

Repair announcement:

So far, Red Hat, Amazon Web Services, SUSE, grsecurity, Ali Yun, Tencent Yun, Huawei Yun and other official announcements have been issued.

data-ratio=0.39302884615384615

Aliyun

On June 18, 2019, Aliyun Emergency Response Center monitored a security research organization abroad to disclose that TCP SACK mechanism of Linux kernel has defects, which can lead to Remote Denial of service. CVE numbers are CVE-2019-11477, CVE-2019-11478 and CVE-2019-11479.

Vulnerability description

Linux kernel 2.6.29 and later versions have defects in handling TCP SACK mechanism, resulting in integer overflow vulnerabilities. An attacker can construct specific SACK packages, trigger Linux server kernel module overflow vulnerabilities remotely, and implement remote denial of service attacks.

Vulnerability rating

High risk of CVE-2019-11477

CVE-2019-11478 Medium Risk

CVE-2019-11479 Medium Risk

data-ratio=0.4134078212290503

Tencent Cloud

data-ratio=0.4722222222222222

Huaweiyun

Red Hat:

Https://access.redhat.com/security/vulnerabilities/tcpsack

AWS:

Https://aws.amazon.com/cn/security/security-bulletins/AWS-2019-005/?Nc1=h_ls

SUSE:

Https://www.suse.com/de-de/support/kb/doc/?Id=7023928

Grsecurity:

Https://seclists.org/oss-sec/2019/q2/182

Ali Yun:

Https://help.aliyun.com/noticelist/articleid/1060012493.html? Spm=a2c4g.789004748.n2.7.15386141 GM8Eyl

Tencent cloud:

Https://cloud.tencent.com/announce/detail/622

Huaweiyun:

Https://www.huaweicloud.com/notice/2018/20190619122553544.html

Reference link:

Https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md

Https://www.zdnet.com/google-amp/article/netflix-to-linux-users-patch-sack-panic-kernel-bug-now-to-stop-remote-attacks/

China IT News APP

Download China IT News APP

Please rate this news

The average score will be displayed after you score.

Post comment

Do not see clearly? Click for a new code.

User comments