Description
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded
to 48 bytes. This allows a remote peer to fragment TCP resend queues
significantly more than if a larger MSS were enforced. A remote attacker
could use this to cause a denial of service. This has been fixed in stable
kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed
in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and
5f3e2bf008c2221478101ee72f5cb4654b9fc363.
Ubuntu-Description
Jonathan Looney discovered that the Linux kernel could be coerced into
segmenting responses into multiple TCP segments. A remote attacker
could construct an ongoing sequence of requests to cause a denial of
service.
Mitigation
This can be mitigated by dropping all packets which specify a too small
MSS value. For example, to only allow MSS values of greater than 500
bytes, an iptables rule can be specified as:
sudo iptables -A INPUT -p tcp -m tcpmss --mss 1:500 -j DROP
Note: this will only take effect if the net.ipv4.tcp_mtu_probing sysctl is
disabled as well.
Notes
tyhicks | This issue is primarily due to the TCP spec not defining a minimum
value for the Minimum Segment Size (MSS). The Linux kernel cannot safely put
a restriction on the MSS because it may break valid TCP connections. This
issue will be addressed by allowing a system administrator to raise the
smallest acceptable MSS value but there will be no default mitigation by
default. |
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | released
(4.15.0-54.58)
|
Ubuntu 16.04 ESM: | released
(4.4.0-154.181)
|
Ubuntu 14.04 ESM: | ignored
(was needed ESM criteria)
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1043.45)
|
Ubuntu 16.04 ESM: | released
(4.4.0-1087.98)
|
Ubuntu 14.04 ESM: | released
(4.4.0-1048.52)
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 16.04 ESM: | released
(4.15.0-1043.45~16.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | released
(4.18.0-1023.24~18.04.1)
|
Ubuntu 16.04 ESM: | released
(4.15.0-1049.54)
|
Ubuntu 14.04 ESM: | released
(4.15.0-1049.54~14.04.1)
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | released
(4.18.0-1023.24~18.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1036.38)
|
Ubuntu 16.04 ESM: | released
(4.15.0-1036.38~16.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | released
(4.18.0-1015.16~18.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1036.38)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | not-affected
(5.0.0-1011.11~18.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | released
(4.18.0-25.26~18.04.1)
|
Ubuntu 16.04 ESM: | released
(4.15.0-54.58~16.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | released
(5.0.0-20.21~18.04.1)
|
Ubuntu 16.04 ESM: | released
(4.15.0-54.58~16.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1038.38)
|
Ubuntu 16.04 ESM: | released
(4.4.0-1051.58)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | released
(4.4.0-154.181~14.04.1)
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1045.50)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1017.19)
|
Ubuntu 16.04 ESM: | released
(4.15.0-1017.19~16.04.2)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1040.43)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(5.2~rc6)
|
Ubuntu 18.04 LTS: | released
(4.15.0-1057.62)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Updated: 2022-04-13 13:37:05 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)