CVE-2019-11477

HIGH

Description

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

References

http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html

http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt

http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en

http://www.openwall.com/lists/oss-security/2019/06/20/3

http://www.openwall.com/lists/oss-security/2019/06/28/2

http://www.openwall.com/lists/oss-security/2019/07/06/3

http://www.openwall.com/lists/oss-security/2019/07/06/4

http://www.openwall.com/lists/oss-security/2019/10/24/1

http://www.openwall.com/lists/oss-security/2019/10/29/3

http://www.vmware.com/security/advisories/VMSA-2019-0010.html

https://access.redhat.com/errata/RHSA-2019:1594

https://access.redhat.com/errata/RHSA-2019:1602

https://access.redhat.com/errata/RHSA-2019:1699

https://access.redhat.com/security/vulnerabilities/tcpsack

https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf

https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff

https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md

https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193

https://kc.mcafee.com/corporate/index?page=content&id=SB10287

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006

https://security.netapp.com/advisory/ntap-20190625-0001/

https://support.f5.com/csp/article/K78234183

https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic

https://www.kb.cert.org/vuls/id/905115

https://www.oracle.com/security-alerts/cpujan2020.html

https://www.oracle.com/security-alerts/cpuoct2020.html

https://www.synology.com/security/advisory/Synology_SA_19_28

https://www.us-cert.gov/ics/advisories/icsa-19-253-03

Details

Source: MITRE

Published: 2019-06-19

Updated: 2020-10-20

Type: CWE-190

Risk Information

CVSS v2.0

Base Score: 7.8

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 10

Severity: HIGH

CVSS v3.0

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*

Configuration 7

OR

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*

Configuration 8

OR

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*

Configuration 9

OR

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*

Configuration 10

OR

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*

Configuration 11

OR

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*

Configuration 12

OR

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*

Configuration 13

OR

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*

Configuration 14

OR

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*

Configuration 15

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

Configuration 16

OR

cpe:2.3:a:redhat:enterprise_linux_atomic_host:-:*:*:*:*:*:*:*

cpe:2.3:a:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_aus:6.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_aus:6.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*

Configuration 17

OR

cpe:2.3:a:pulsesecure:pulse_connect_secure:-:*:*:*:*:*:*:*

cpe:2.3:a:pulsesecure:pulse_policy_secure:-:*:*:*:*:*:*:*

cpe:2.3:a:pulsesecure:pulse_secure_virtual_application_delivery_controller:-:*:*:*:*:*:*:*

Configuration 18

OR

cpe:2.3:a:f5:traffix_sdc:*:*:*:*:*:*:*:* versions from 5.0.0 to 5.1.0 (inclusive)

Tenable Plugins

View all (81 total)

IDNameProductFamilySeverity
145651CentOS 8 : kernel (CESA-2019:1479)NessusCentOS Local Security Checks
high
138345Arista Networks CloudVision Portal Linux Kernel TCP Multiple DoS (SA0041)NessusMisc.
high
134891Check Point Gaia Operating System Administrator password truncation (sk156192)NessusFirewalls
high
134303Arista Networks EOS Linux Kernel TCP Multiple DoS (SA0041)NessusMisc.
high
133458Virtuozzo 7 : readykernel-patch (VZA-2019-068)NessusVirtuozzo Local Security Checks
high
133456Virtuozzo 7 : readykernel-patch (VZA-2019-050)NessusVirtuozzo Local Security Checks
high
132257RancherOS < 1.5.3 Multiple Vulnerabilities (SACK Panic)NessusMisc.
high
130950SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2950-1) (SACK Panic)NessusSuSE Local Security Checks
critical
720312Siemens Industrial Products Integer Overflow or Wraparound or Uncontrolled Resource Consumption (ICSA-19-253-03)Nessus Network MonitorSCADA
high
130423SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2821-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
129316F5 Networks BIG-IP : Linux SACK Panic vulnerability (K78234183) (SACK Panic)NessusF5 Networks Local Security Checks
high
129302Palo Alto Networks PAN-OS 7.1.x < 7.1.24 / 8.0.x < 8.0.19 / 8.1.x < 8.1.8-h5 / 9.0.x < 9.0.2-h4 Multiple VulnerabilitiesNessusPalo Alto Local Security Checks
high
129284SUSE SLED15 / SLES15 Security Update : kernel-source-rt (SUSE-SU-2019:2430-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (SACK Panic) (SACK Slowness) (Spectre)NessusSuSE Local Security Checks
high
128689NewStart CGSL MAIN 4.06 : kernel Multiple Vulnerabilities (NS-SA-2019-0177)NessusNewStart CGSL Local Security Checks
high
127590Oracle Linux 8 : kernel (ELSA-2019-1479) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
127456NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0168)NessusNewStart CGSL Local Security Checks
high
127451NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0165)NessusNewStart CGSL Local Security Checks
high
127450NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0165)NessusNewStart CGSL Local Security Checks
medium
127445NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0162)NessusNewStart CGSL Local Security Checks
high
127444NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0162)NessusNewStart CGSL Local Security Checks
high
127029EulerOS 2.0 SP8 : kernel (EulerOS-SA-2019-1792)NessusHuawei Local Security Checks
medium
126983SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1948-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126981SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1924-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126763Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (SACK Panic) (SACK Slowness)NessusScientific Linux Local Security Checks
high
126559RHEL 7 : Virtualization Manager (RHSA-2019:1699) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
126544EulerOS Virtualization for ARM 64 3.0.2.0 : kernel (EulerOS-SA-2019-1702)NessusHuawei Local Security Checks
low
126433EulerOS 2.0 SP5 : kernel (EulerOS-SA-2019-1692)NessusHuawei Local Security Checks
low
126301RHEL 7 : Virtualization Manager (RHSA-2019:1594) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
126299EulerOS 2.0 SP3 : kernel (EulerOS-SA-2019-1672)NessusHuawei Local Security Checks
high
126266EulerOS 2.0 SP2 : kernel (EulerOS-SA-2019-1639)NessusHuawei Local Security Checks
high
126250RHEL 7 : kernel-alt (RHSA-2019:1602) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
126240SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1692-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126176Photon OS 1.0: Linux PHSA-2019-1.0-0240NessusPhotonOS Local Security Checks
high
126175Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2019-052)NessusVirtuozzo Local Security Checks
high
126171SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1671-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126170SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1668-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126106Photon OS 2.0: Linux PHSA-2019-2.0-0165NessusPhotonOS Local Security Checks
high
126059openSUSE Security Update : the Linux Kernel (openSUSE-2019-1571) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126057RHEL 6 : MRG (RHSA-2019:1487) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
medium
126045SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1550-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (SACK Panic) (SACK Slowness) (Spectre)NessusSuSE Local Security Checks
high
126040openSUSE Security Update : the Linux Kernel (openSUSE-2019-1579) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126033openSUSE Security Update : the Linux Kernel (openSUSE-2019-1570) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126031Slackware 14.2 / current : kernel (SSA:2019-169-01) (SACK Panic) (SACK Slowness)NessusSlackware Local Security Checks
high
126023Oracle Linux 6 : kernel (ELSA-2019-1488) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
126022Oracle Linux 7 : kernel (ELSA-2019-1481) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
126020OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0026) (SACK Panic) (SACK Slowness)NessusOracleVM Local Security Checks
high
126017Fedora 29 : kernel / kernel-headers (2019-914542e05c) (SACK Panic) (SACK Slowness)NessusFedora Local Security Checks
high
126016Fedora 30 : kernel / kernel-headers (2019-6c3d89b3d0) (SACK Panic) (SACK Slowness)NessusFedora Local Security Checks
high
126009Debian DLA-1824-1 : linux-4.9 security update (SACK Panic) (SACK Slowness)NessusDebian Local Security Checks
high
126007CentOS 6 : kernel (CESA-2019:1488) (SACK Panic) (SACK Slowness)NessusCentOS Local Security Checks
high
126006CentOS 7 : kernel (CESA-2019:1481) (SACK Panic) (SACK Slowness)NessusCentOS Local Security Checks
high
125998Ubuntu 16.04 LTS / 18.04 LTS / 18.10 / 19.04 : Linux kernel vulnerabilities (USN-4017-1) (SACK Panic) (SACK Slowness)NessusUbuntu Local Security Checks
high
125997SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1536-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125996SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1535-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125995SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1534-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125994SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1533-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125993SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:1532-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125992SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:1530-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125991SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1529-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125990SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1527-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125981Scientific Linux Security Update : kernel on SL7.x x86_64 (20190617) (SACK Panic) (SACK Slowness)NessusScientific Linux Local Security Checks
high
125980Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20190617) (SACK Panic) (SACK Slowness)NessusScientific Linux Local Security Checks
high
125977RHEL 6 : kernel (RHSA-2019:1490) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125976RHEL 6 : kernel (RHSA-2019:1489) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125975RHEL 6 : kernel (RHSA-2019:1488) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125974RHEL 7 : kernel-rt (RHSA-2019:1486) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125973RHEL 7 : kernel (RHSA-2019:1485) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125972RHEL 7 : kernel (RHSA-2019:1484) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125971RHEL 7 : kernel (RHSA-2019:1483) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
medium
125970RHEL 7 : kernel (RHSA-2019:1482) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125969RHEL 7 : kernel (RHSA-2019:1481) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125968RHEL 8 : kernel-rt (RHSA-2019:1480) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125967RHEL 8 : kernel (RHSA-2019:1479) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125966Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2019-4689) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
125965Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4686) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
125964Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2019-4685) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
125963Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4684) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
125959Debian DSA-4465-1 : linux - security update (SACK Panic) (SACK Slowness)NessusDebian Local Security Checks
high
125958Debian DLA-1823-1 : linux security update (SACK Panic) (SACK Slowness)NessusDebian Local Security Checks
high
125955Amazon Linux AMI : kernel (ALAS-2019-1222) (SACK Panic) (SACK Slowness)NessusAmazon Linux Local Security Checks
high
125954Amazon Linux 2 : kernel (ALAS-2019-1222) (SACK Panic) (SACK Slowness)NessusAmazon Linux Local Security Checks
high