<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Linux TCP SACK and PTP vulnerabilities</title>
	<atom:link href="http://www.epanorama.net/blog/2019/06/22/linux-tcp-sack-and-ptp-vulnerabilities/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/06/22/linux-tcp-sack-and-ptp-vulnerabilities/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 11 Apr 2026 21:37:42 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/22/linux-tcp-sack-and-ptp-vulnerabilities/comment-page-1/#comment-1643248</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 25 Jun 2019 21:35:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182865#comment-1643248</guid>
		<description><![CDATA[SACK Panic &amp; Slowness: KernelCare Live Patches Are Here
https://blog.kernelcare.com/sack-panic-slowness-kernelcare-live-patches-are-here

Best Case Scenario: Slowdown

All of the Linux-threatening vulnerabilities exploit the kernel’s TCP Selective Acknowledgement feature (hence “TCP SACK”). Two of the vulnerabilities – CVE–2019–11478, and CVE–2019–11479 – cause the TCP retransmission queue to become so fragmented that the kernel spends excessive resources managing that TCP connection’s SACK elements. While this isn’t disastrous, it could cause significant slowdown in the CPU. 

Worst Case Scenario: Disaster

The third vulnerability – CVE–2019–11477 – has rightfully been dubbed “SACK Panic.” Affecting all kernels 2.6.29 and newer

Like the slowness vulnerabilities, SACK Panic is particularly worrying because it can be remotely-triggered. Malicious actors can trigger a full-blown panic, which can utterly bork an OS, forcing the restart of a targeted host and causing a temporary shutdown in services.]]></description>
		<content:encoded><![CDATA[<p>SACK Panic &amp; Slowness: KernelCare Live Patches Are Here<br />
<a href="https://blog.kernelcare.com/sack-panic-slowness-kernelcare-live-patches-are-here" rel="nofollow">https://blog.kernelcare.com/sack-panic-slowness-kernelcare-live-patches-are-here</a></p>
<p>Best Case Scenario: Slowdown</p>
<p>All of the Linux-threatening vulnerabilities exploit the kernel’s TCP Selective Acknowledgement feature (hence “TCP SACK”). Two of the vulnerabilities – CVE–2019–11478, and CVE–2019–11479 – cause the TCP retransmission queue to become so fragmented that the kernel spends excessive resources managing that TCP connection’s SACK elements. While this isn’t disastrous, it could cause significant slowdown in the CPU. </p>
<p>Worst Case Scenario: Disaster</p>
<p>The third vulnerability – CVE–2019–11477 – has rightfully been dubbed “SACK Panic.” Affecting all kernels 2.6.29 and newer</p>
<p>Like the slowness vulnerabilities, SACK Panic is particularly worrying because it can be remotely-triggered. Malicious actors can trigger a full-blown panic, which can utterly bork an OS, forcing the restart of a targeted host and causing a temporary shutdown in services.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/22/linux-tcp-sack-and-ptp-vulnerabilities/comment-page-1/#comment-1643170</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 24 Jun 2019 19:52:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182865#comment-1643170</guid>
		<description><![CDATA[LINUX ADMINS! GRAB OUR FREE TOOL TO PROTECT AGAINST NETFLIX SACK PANIC
https://www.sentinelone.com/blog/grab-our-free-tool-linux-sack-panic/

Linux admins are being urged to check for and patch three TCP networking vulnerabilities discovered by Netflix researchers. While patches have been made available, testing patches against a full stack of software applications can sometimes be a lengthy process. Given the urgency and widespread nature of the vulnerabilities, SentinelOne has released a free tool that can quickly identify affected Linux systems and immediately protect against these new vulnerabilities.]]></description>
		<content:encoded><![CDATA[<p>LINUX ADMINS! GRAB OUR FREE TOOL TO PROTECT AGAINST NETFLIX SACK PANIC<br />
<a href="https://www.sentinelone.com/blog/grab-our-free-tool-linux-sack-panic/" rel="nofollow">https://www.sentinelone.com/blog/grab-our-free-tool-linux-sack-panic/</a></p>
<p>Linux admins are being urged to check for and patch three TCP networking vulnerabilities discovered by Netflix researchers. While patches have been made available, testing patches against a full stack of software applications can sometimes be a lengthy process. Given the urgency and widespread nature of the vulnerabilities, SentinelOne has released a free tool that can quickly identify affected Linux systems and immediately protect against these new vulnerabilities.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/22/linux-tcp-sack-and-ptp-vulnerabilities/comment-page-1/#comment-1643072</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 23 Jun 2019 16:41:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182865#comment-1643072</guid>
		<description><![CDATA[https://hackaday.com/2019/06/21/this-week-in-security-sack-of-death-rambleed-hibp-for-sale-and-oracle-weblogic-again/

Netflix isn’t the first name to come to mind when considering security research firms, but they make heavy use of FreeBSD in their content delivery system and do security research as a result. Their first security bulletin of the year, not surprisingly, covers a FreeBSD vulnerability that happens to also affect Linux kernels from the last 10 years. This vulnerability uses SACKs and odd MSS values to crash a server kernel.

Netflix outlined several problems related to SACK , but the most serious vulnerability is triggered when an attacker makes a TCP connection to a Linux or FreeBSD server, and sets the MSS to the lowest possible value. After data is transferred, the attacker sends a sequence of SACK packets, requesting the re-transfer of specific multiple packets. This specially crafted series of packets causes the multiple fragmented messages to overflow the server’s outgoing buffer. It appears this attack cannot lead to code execution, but it does cause an immediate kernel panic, which essentially knocks the target machine offline.

Patches fixing the problem have been released, but aren’t yet available for easy install on live systems. 

As a workaround, Netflix suggests either disabling SACK altogether, or filtering packets with very low MSS values. 

https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2019/06/21/this-week-in-security-sack-of-death-rambleed-hibp-for-sale-and-oracle-weblogic-again/" rel="nofollow">https://hackaday.com/2019/06/21/this-week-in-security-sack-of-death-rambleed-hibp-for-sale-and-oracle-weblogic-again/</a></p>
<p>Netflix isn’t the first name to come to mind when considering security research firms, but they make heavy use of FreeBSD in their content delivery system and do security research as a result. Their first security bulletin of the year, not surprisingly, covers a FreeBSD vulnerability that happens to also affect Linux kernels from the last 10 years. This vulnerability uses SACKs and odd MSS values to crash a server kernel.</p>
<p>Netflix outlined several problems related to SACK , but the most serious vulnerability is triggered when an attacker makes a TCP connection to a Linux or FreeBSD server, and sets the MSS to the lowest possible value. After data is transferred, the attacker sends a sequence of SACK packets, requesting the re-transfer of specific multiple packets. This specially crafted series of packets causes the multiple fragmented messages to overflow the server’s outgoing buffer. It appears this attack cannot lead to code execution, but it does cause an immediate kernel panic, which essentially knocks the target machine offline.</p>
<p>Patches fixing the problem have been released, but aren’t yet available for easy install on live systems. </p>
<p>As a workaround, Netflix suggests either disabling SACK altogether, or filtering packets with very low MSS values. </p>
<p><a href="https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md" rel="nofollow">https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/22/linux-tcp-sack-and-ptp-vulnerabilities/comment-page-1/#comment-1643061</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 23 Jun 2019 14:27:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182865#comment-1643061</guid>
		<description><![CDATA[Anyone seen those attacks on the wild?
Few days ago I saw some strangely high load average (over 200) on one web server. Applying fix to this issue and some other fixes solved the issues - so I can&#039;t say for sure if it was this or something else causing this.]]></description>
		<content:encoded><![CDATA[<p>Anyone seen those attacks on the wild?<br />
Few days ago I saw some strangely high load average (over 200) on one web server. Applying fix to this issue and some other fixes solved the issues &#8211; so I can&#8217;t say for sure if it was this or something else causing this.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/22/linux-tcp-sack-and-ptp-vulnerabilities/comment-page-1/#comment-1643060</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 23 Jun 2019 14:21:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182865#comment-1643060</guid>
		<description><![CDATA[https://unit42.paloaltonetworks.com/tcp-sack-panics-linux-servers/

Conclusion
Due to the low complexity and high severity of this vulnerability, it won’t be surprising to see large scale DDoS attacks in a few days. It is critical to update the Linux kernel as soon as possible. For the servers running in the public cloud with TCP services open to the internet, it is even more critical to patch immediately or at least set up firewall rules to block the attack.]]></description>
		<content:encoded><![CDATA[<p><a href="https://unit42.paloaltonetworks.com/tcp-sack-panics-linux-servers/" rel="nofollow">https://unit42.paloaltonetworks.com/tcp-sack-panics-linux-servers/</a></p>
<p>Conclusion<br />
Due to the low complexity and high severity of this vulnerability, it won’t be surprising to see large scale DDoS attacks in a few days. It is critical to update the Linux kernel as soon as possible. For the servers running in the public cloud with TCP services open to the internet, it is even more critical to patch immediately or at least set up firewall rules to block the attack.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/22/linux-tcp-sack-and-ptp-vulnerabilities/comment-page-1/#comment-1642994</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 22 Jun 2019 14:33:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182865#comment-1642994</guid>
		<description><![CDATA[Check Point response to TCP SACK PANIC - Linux Kernel vulnerabilities - CVE-2019-11477, CVE-2019-11478 &amp; CVE-2019-11479
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;solutionid=sk156192&amp;t=1561189327306]]></description>
		<content:encoded><![CDATA[<p>Check Point response to TCP SACK PANIC &#8211; Linux Kernel vulnerabilities &#8211; CVE-2019-11477, CVE-2019-11478 &amp; CVE-2019-11479<br />
<a href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&#038;solutionid=sk156192&#038;t=1561189327306" rel="nofollow">https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&#038;solutionid=sk156192&#038;t=1561189327306</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
