Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.
http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en
http://www.openwall.com/lists/oss-security/2019/06/20/3
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
http://www.openwall.com/lists/oss-security/2019/10/24/1
http://www.openwall.com/lists/oss-security/2019/10/29/3
http://www.vmware.com/security/advisories/VMSA-2019-0010.html
https://access.redhat.com/errata/RHSA-2019:1594
https://access.redhat.com/errata/RHSA-2019:1602
https://access.redhat.com/errata/RHSA-2019:1699
https://access.redhat.com/security/vulnerabilities/tcpsack
https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193
https://kc.mcafee.com/corporate/index?page=content&id=SB10287
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006
https://security.netapp.com/advisory/ntap-20190625-0001/
https://support.f5.com/csp/article/K78234183
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic
https://www.kb.cert.org/vuls/id/905115
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.synology.com/security/advisory/Synology_SA_19_28
Source: MITRE
Published: 2019-06-19
Updated: 2020-10-20
Type: CWE-190
Base Score: 7.8
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact Score: 6.9
Exploitability Score: 10
Severity: HIGH
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Impact Score: 3.6
Exploitability Score: 3.9
Severity: HIGH
OR
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
OR
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)
cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*
OR
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)
cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*
OR
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)
cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*
OR
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)
OR
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)
cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*
OR
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)
OR
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)
cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*
OR
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)
cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*
OR
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)
cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*
OR
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)
cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*
OR
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)
OR
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)
OR
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)
cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)
OR
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
OR
cpe:2.3:a:redhat:enterprise_linux_atomic_host:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_aus:6.6:*:*:*:*:*:*:*
OR
cpe:2.3:a:pulsesecure:pulse_connect_secure:-:*:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_policy_secure:-:*:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_secure_virtual_application_delivery_controller:-:*:*:*:*:*:*:*
OR
cpe:2.3:a:f5:traffix_sdc:*:*:*:*:*:*:*:* versions from 5.0.0 to 5.1.0 (inclusive)
ID | Name | Product | Family | Severity |
---|---|---|---|---|
145651 | CentOS 8 : kernel (CESA-2019:1479) | Nessus | CentOS Local Security Checks | high |
138345 | Arista Networks CloudVision Portal Linux Kernel TCP Multiple DoS (SA0041) | Nessus | Misc. | high |
134891 | Check Point Gaia Operating System Administrator password truncation (sk156192) | Nessus | Firewalls | high |
134303 | Arista Networks EOS Linux Kernel TCP Multiple DoS (SA0041) | Nessus | Misc. | high |
133458 | Virtuozzo 7 : readykernel-patch (VZA-2019-068) | Nessus | Virtuozzo Local Security Checks | high |
133456 | Virtuozzo 7 : readykernel-patch (VZA-2019-050) | Nessus | Virtuozzo Local Security Checks | high |
132257 | RancherOS < 1.5.3 Multiple Vulnerabilities (SACK Panic) | Nessus | Misc. | high |
130950 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2950-1) (SACK Panic) | Nessus | SuSE Local Security Checks | critical |
720312 | Siemens Industrial Products Integer Overflow or Wraparound or Uncontrolled Resource Consumption (ICSA-19-253-03) | Nessus Network Monitor | SCADA | high |
130423 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2821-1) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
129316 | F5 Networks BIG-IP : Linux SACK Panic vulnerability (K78234183) (SACK Panic) | Nessus | F5 Networks Local Security Checks | high |
129302 | Palo Alto Networks PAN-OS 7.1.x < 7.1.24 / 8.0.x < 8.0.19 / 8.1.x < 8.1.8-h5 / 9.0.x < 9.0.2-h4 Multiple Vulnerabilities | Nessus | Palo Alto Local Security Checks | high |
129284 | SUSE SLED15 / SLES15 Security Update : kernel-source-rt (SUSE-SU-2019:2430-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (SACK Panic) (SACK Slowness) (Spectre) | Nessus | SuSE Local Security Checks | high |
128689 | NewStart CGSL MAIN 4.06 : kernel Multiple Vulnerabilities (NS-SA-2019-0177) | Nessus | NewStart CGSL Local Security Checks | high |
127590 | Oracle Linux 8 : kernel (ELSA-2019-1479) (SACK Panic) (SACK Slowness) | Nessus | Oracle Linux Local Security Checks | high |
127456 | NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0168) | Nessus | NewStart CGSL Local Security Checks | high |
127451 | NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0165) | Nessus | NewStart CGSL Local Security Checks | high |
127450 | NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0165) | Nessus | NewStart CGSL Local Security Checks | medium |
127445 | NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0162) | Nessus | NewStart CGSL Local Security Checks | high |
127444 | NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0162) | Nessus | NewStart CGSL Local Security Checks | high |
127029 | EulerOS 2.0 SP8 : kernel (EulerOS-SA-2019-1792) | Nessus | Huawei Local Security Checks | medium |
126983 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1948-1) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
126981 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1924-1) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
126763 | Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (SACK Panic) (SACK Slowness) | Nessus | Scientific Linux Local Security Checks | high |
126559 | RHEL 7 : Virtualization Manager (RHSA-2019:1699) (SACK Panic) (SACK Slowness) | Nessus | Red Hat Local Security Checks | high |
126544 | EulerOS Virtualization for ARM 64 3.0.2.0 : kernel (EulerOS-SA-2019-1702) | Nessus | Huawei Local Security Checks | low |
126433 | EulerOS 2.0 SP5 : kernel (EulerOS-SA-2019-1692) | Nessus | Huawei Local Security Checks | low |
126301 | RHEL 7 : Virtualization Manager (RHSA-2019:1594) (SACK Panic) (SACK Slowness) | Nessus | Red Hat Local Security Checks | high |
126299 | EulerOS 2.0 SP3 : kernel (EulerOS-SA-2019-1672) | Nessus | Huawei Local Security Checks | high |
126266 | EulerOS 2.0 SP2 : kernel (EulerOS-SA-2019-1639) | Nessus | Huawei Local Security Checks | high |
126250 | RHEL 7 : kernel-alt (RHSA-2019:1602) (SACK Panic) (SACK Slowness) | Nessus | Red Hat Local Security Checks | high |
126240 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1692-1) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
126176 | Photon OS 1.0: Linux PHSA-2019-1.0-0240 | Nessus | PhotonOS Local Security Checks | high |
126175 | Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2019-052) | Nessus | Virtuozzo Local Security Checks | high |
126171 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1671-1) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
126170 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1668-1) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
126106 | Photon OS 2.0: Linux PHSA-2019-2.0-0165 | Nessus | PhotonOS Local Security Checks | high |
126059 | openSUSE Security Update : the Linux Kernel (openSUSE-2019-1571) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
126057 | RHEL 6 : MRG (RHSA-2019:1487) (SACK Panic) (SACK Slowness) | Nessus | Red Hat Local Security Checks | medium |
126045 | SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1550-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (SACK Panic) (SACK Slowness) (Spectre) | Nessus | SuSE Local Security Checks | high |
126040 | openSUSE Security Update : the Linux Kernel (openSUSE-2019-1579) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
126033 | openSUSE Security Update : the Linux Kernel (openSUSE-2019-1570) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
126031 | Slackware 14.2 / current : kernel (SSA:2019-169-01) (SACK Panic) (SACK Slowness) | Nessus | Slackware Local Security Checks | high |
126023 | Oracle Linux 6 : kernel (ELSA-2019-1488) (SACK Panic) (SACK Slowness) | Nessus | Oracle Linux Local Security Checks | high |
126022 | Oracle Linux 7 : kernel (ELSA-2019-1481) (SACK Panic) (SACK Slowness) | Nessus | Oracle Linux Local Security Checks | high |
126020 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0026) (SACK Panic) (SACK Slowness) | Nessus | OracleVM Local Security Checks | high |
126017 | Fedora 29 : kernel / kernel-headers (2019-914542e05c) (SACK Panic) (SACK Slowness) | Nessus | Fedora Local Security Checks | high |
126016 | Fedora 30 : kernel / kernel-headers (2019-6c3d89b3d0) (SACK Panic) (SACK Slowness) | Nessus | Fedora Local Security Checks | high |
126009 | Debian DLA-1824-1 : linux-4.9 security update (SACK Panic) (SACK Slowness) | Nessus | Debian Local Security Checks | high |
126007 | CentOS 6 : kernel (CESA-2019:1488) (SACK Panic) (SACK Slowness) | Nessus | CentOS Local Security Checks | high |
126006 | CentOS 7 : kernel (CESA-2019:1481) (SACK Panic) (SACK Slowness) | Nessus | CentOS Local Security Checks | high |
125998 | Ubuntu 16.04 LTS / 18.04 LTS / 18.10 / 19.04 : Linux kernel vulnerabilities (USN-4017-1) (SACK Panic) (SACK Slowness) | Nessus | Ubuntu Local Security Checks | high |
125997 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1536-1) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
125996 | SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1535-1) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
125995 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1534-1) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
125994 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1533-1) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
125993 | SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:1532-1) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
125992 | SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:1530-1) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
125991 | SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1529-1) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
125990 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1527-1) (SACK Panic) (SACK Slowness) | Nessus | SuSE Local Security Checks | high |
125981 | Scientific Linux Security Update : kernel on SL7.x x86_64 (20190617) (SACK Panic) (SACK Slowness) | Nessus | Scientific Linux Local Security Checks | high |
125980 | Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20190617) (SACK Panic) (SACK Slowness) | Nessus | Scientific Linux Local Security Checks | high |
125977 | RHEL 6 : kernel (RHSA-2019:1490) (SACK Panic) (SACK Slowness) | Nessus | Red Hat Local Security Checks | high |
125976 | RHEL 6 : kernel (RHSA-2019:1489) (SACK Panic) (SACK Slowness) | Nessus | Red Hat Local Security Checks | high |
125975 | RHEL 6 : kernel (RHSA-2019:1488) (SACK Panic) (SACK Slowness) | Nessus | Red Hat Local Security Checks | high |
125974 | RHEL 7 : kernel-rt (RHSA-2019:1486) (SACK Panic) (SACK Slowness) | Nessus | Red Hat Local Security Checks | high |
125973 | RHEL 7 : kernel (RHSA-2019:1485) (SACK Panic) (SACK Slowness) | Nessus | Red Hat Local Security Checks | high |
125972 | RHEL 7 : kernel (RHSA-2019:1484) (SACK Panic) (SACK Slowness) | Nessus | Red Hat Local Security Checks | high |
125971 | RHEL 7 : kernel (RHSA-2019:1483) (SACK Panic) (SACK Slowness) | Nessus | Red Hat Local Security Checks | medium |
125970 | RHEL 7 : kernel (RHSA-2019:1482) (SACK Panic) (SACK Slowness) | Nessus | Red Hat Local Security Checks | high |
125969 | RHEL 7 : kernel (RHSA-2019:1481) (SACK Panic) (SACK Slowness) | Nessus | Red Hat Local Security Checks | high |
125968 | RHEL 8 : kernel-rt (RHSA-2019:1480) (SACK Panic) (SACK Slowness) | Nessus | Red Hat Local Security Checks | high |
125967 | RHEL 8 : kernel (RHSA-2019:1479) (SACK Panic) (SACK Slowness) | Nessus | Red Hat Local Security Checks | high |
125966 | Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2019-4689) (SACK Panic) (SACK Slowness) | Nessus | Oracle Linux Local Security Checks | high |
125965 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4686) (SACK Panic) (SACK Slowness) | Nessus | Oracle Linux Local Security Checks | high |
125964 | Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2019-4685) (SACK Panic) (SACK Slowness) | Nessus | Oracle Linux Local Security Checks | high |
125963 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4684) (SACK Panic) (SACK Slowness) | Nessus | Oracle Linux Local Security Checks | high |
125959 | Debian DSA-4465-1 : linux - security update (SACK Panic) (SACK Slowness) | Nessus | Debian Local Security Checks | high |
125958 | Debian DLA-1823-1 : linux security update (SACK Panic) (SACK Slowness) | Nessus | Debian Local Security Checks | high |
125955 | Amazon Linux AMI : kernel (ALAS-2019-1222) (SACK Panic) (SACK Slowness) | Nessus | Amazon Linux Local Security Checks | high |
125954 | Amazon Linux 2 : kernel (ALAS-2019-1222) (SACK Panic) (SACK Slowness) | Nessus | Amazon Linux Local Security Checks | high |