An issue was discovered in net/ipv4/sysctlnetipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcpinput.c signed integer overflow in tcpackupdatertt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcpminrtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.
[
{
"id": "CVE-2019-18805-ba8492cf",
"deprecated": false,
"signature_type": "Line",
"digest": {
"line_hashes": [
"35600440049176164097758117299379224570",
"124903854351521046597961874731075085050",
"130631121879524512594207600453882602321",
"286414677112431298625657505592878486067",
"334086374242641377731931294329034480673",
"258017365418260299343064397264571110018",
"162280686152153300552183305865021430080",
"214672113814592977844103631969447806837"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "net/ipv4/sysctl_net_ipv4.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@19fad20d15a6494f47f85d869f00b11343ee5c78"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-18805.json"