【Security Notice】Statement on Linux kernel TCP SACK mechanism remote DoS vulnerability

Initial Release Date: July 1, 2019
 

Security Notice

Recently, RedHat disclosed a serious remote DoS vulnerability (CVE-2019-11477) on Linux and FreeBSD system kernels, affecting Linux kernel 2.6.29 and above. An attacker could exploit the vulnerability to construct and send a specific SACK sequence request to the target server, causing the target server to crash or denial of service. The Linux Foundation has released a patch to fix this vulnerability.

ZTE started the impact analysis immediately after learning about the vulnerability, and related work is still ongoing. 

In order to avoid danger as much as possible, we recommend that you:

1. Disable SACK

2. Set up a firewall to intercept malicious data packets

The versions have been released, we have arranged upgrades by issuing technical notices.

 

Revision History

July 1, 2019, Initial

May 18, 2021, Updated the advisory description
 

 Responses to Cybersecurity Incidents

ZTE's PSIRT team is responsible for receiving, processing and disclosing security vulnerabilities related to ZTE's products and solutions. Coordinating with customers and stakeholders, the PSIRT team quickly develops solutions. Creating a key security incident response mechanism for security incidents ensures a unified coordination, fast repair, and swift service recovery into effect. 

To obtain ZTE product vulnerability information, please visit:

http://support.zte.com.cn/support/news/NewsMain.aspx

If you need to report security vulnerabilities related to ZTE products, please contact ZTE PSIRT: psirt@zte.com.cn, PGP key ID: FF095577.

Supporting team contacts

1. ZTE GCSC hotline:

0755-26770800

800-830-1118

400-830-1118

2. Product forum at ZTE Support website.