Description: DoS through u16 overflow of TCP_SKB_CB(skb)->tcp_gso_segs References: https://patchwork.ozlabs.org/patch/1117155/ https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md Notes: Bugs: upstream: released (5.2-rc6) [3b4929f65b0d8249f19a50245cd88ed1a2f78cff] 4.19-upstream-stable: released (4.19.52) [c09be31461ed140976c60a87364415454a2c3d42] 4.9-upstream-stable: released (4.9.182) [cc1b58ccb78e0de51bcec1f2914d9296260668bd] 3.16-upstream-stable: released (3.16.69) [ef27e3c531782ec8213108e11e5515f9724303c7] sid: released (4.19.37-4) [bugfix/all/tcp-limit-payload-size-of-sacked-skbs.patch] 4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.168-1+deb9u3) [bugfix/all/tcp-limit-payload-size-of-sacked-skbs.patch] 3.16-jessie-security: released (3.16.68-2) [bugfix/all/tcp-limit-payload-size-of-sacked-skbs.patch]