{"id":"CVE-2019-18805","details":"An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.","modified":"2026-03-15T22:27:58.798581Z","published":"2019-11-07T14:15:11.067Z","related":["SUSE-SU-2019:2951-1","SUSE-SU-2019:2953-1","SUSE-SU-2019:2984-1","SUSE-SU-2019:3200-1","SUSE-SU-2019:3294-1","SUSE-SU-2019:3295-1","SUSE-SU-2019:3317-1","SUSE-SU-2019:3371-1","SUSE-SU-2019:3372-1","SUSE-SU-2019:3379-1","SUSE-SU-2019:3381-1","SUSE-SU-2020:0093-1","openSUSE-SU-2019:2503-1","openSUSE-SU-2019:2507-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0740"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20191205-0001/"},{"type":"FIX","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19fad20d15a6494f47f85d869f00b11343ee5c78"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"4.4"},{"fixed":"4.4.180"}]},{"events":[{"introduced":"4.9"},{"fixed":"4.9.172"}]},{"events":[{"introduced":"4.14"},{"fixed":"4.14.115"}]},{"events":[{"introduced":"4.19"},{"fixed":"4.19.38"}]},{"events":[{"introduced":"5.0"},{"fixed":"5.0.11"}]},{"events":[{"introduced":"0"},{"last_affected":"5.1-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.1-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.1-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.1-rc4"}]},{"events":[{"introduced":"0"},{"last_affected":"5.1-rc5"}]},{"events":[{"introduced":"0"},{"last_affected":"5.1-rc6"}]},{"events":[{"introduced":"0"},{"last_affected":"5.1-rc7"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"11.0.0"},{"last_affected":"11.60.3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-18805.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}