Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels.
The vulnerabilities specifically relate to the minimum segment size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed “SACK Panic ,” allows a remotely-triggered kernel panic on recent Linux kernels.
Disable SACK processing by executing "sysctl -w net.ipv4.tcp_sack=0". And to make it permanent across reboots, "echo "net.ipv4.tcp_sack=0" > /etc/sysctl.d/90-SACK_Panic.conf".
Block low-MSS packets on the firewall with "echo "iptables -A INPUT -p tcp -m tcpmss --mss 1:500 -j DROP" >> /etc/firewall.user".
does not work since missing -w -> sysctl -w net.ipv4.tcp_sack=0
From own experience, a node with kernel 4.14.123, the above has stopped the reboots caused by the attack - seen this been exploited for the past 2 weeks
No I am implying that the statement "[@eduperez posted workarounds] don't fix CVE-2019-11479 on Linux" contradicts https://www.openwall.com/lists/oss-security/2019/06/17/5 which suggests the netfilter rule (among other filter options) as temporary workaround for issue #4 (CVE-2019-11479).
Some reports indicate the only devices that accept incoming TCP connections are affected. However, I am not sure that devices routing TCP connections on behalf of others are not affected.
I do not pretend to be an expert on the subject, I'm just reporting here the info I have gathered.
For FreeBSD users, from the linked Netflix article
CVE-2019-5599: SACK Slowness (FreeBSD 12 using the RACK TCP Stack)
Workaround #1: Apply the patch split_limit.patch and set the net.inet.tcp.rack.split_limit sysctl to a reasonable value to limit the size of the SACK table.
Workaround #2: Temporarily disable the RACK TCP stack.