CVE-2019-11477

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

References

https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md

https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic

https://access.redhat.com/security/vulnerabilities/tcpsack

https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff

https://support.f5.com/csp/article/K78234183

http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html

https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193

https://www.kb.cert.org/vuls/id/905115

http://www.openwall.com/lists/oss-security/2019/06/20/3

https://www.synology.com/security/advisory/Synology_SA_19_28

https://security.netapp.com/advisory/ntap-20190625-0001/

https://access.redhat.com/errata/RHSA-2019:1594

https://access.redhat.com/errata/RHSA-2019:1602

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006

https://kc.mcafee.com/corporate/index?page=content&id=SB10287

http://www.openwall.com/lists/oss-security/2019/06/28/2

http://www.vmware.com/security/advisories/VMSA-2019-0010.html

http://www.openwall.com/lists/oss-security/2019/07/06/3

http://www.openwall.com/lists/oss-security/2019/07/06/4

https://access.redhat.com/errata/RHSA-2019:1699

https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf

https://www.us-cert.gov/ics/advisories/icsa-19-253-03

http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html

http://www.openwall.com/lists/oss-security/2019/10/24/1

http://www.openwall.com/lists/oss-security/2019/10/29/3

http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en

https://www.oracle.com/security-alerts/cpujan2020.html

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt

https://www.oracle.com/security-alerts/cpuoct2020.html

Details

Source: MITRE

Published: 2019-06-19

Updated: 2020-10-20

Type: CWE-190

Risk Information

CVSS v2

Base Score: 7.8

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

Configuration 4

OR

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

Configuration 5

OR

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

Configuration 7

OR

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*

Configuration 8

OR

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

Configuration 9

OR

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

Configuration 10

OR

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*

Configuration 11

OR

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

Configuration 12

OR

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

Configuration 13

OR

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*

Configuration 14

OR

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

Configuration 15

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 16

OR

cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_aus:6.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_aus:6.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*

cpe:2.3:a:redhat:enterprise_linux_atomic_host:-:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

Configuration 17

OR

cpe:2.3:a:pulsesecure:pulse_policy_secure:-:*:*:*:*:*:*:*

cpe:2.3:a:pulsesecure:pulse_secure_virtual_application_delivery_controller:-:*:*:*:*:*:*:*

cpe:2.3:a:pulsesecure:pulse_connect_secure:-:*:*:*:*:*:*:*

Configuration 18

OR

cpe:2.3:a:f5:traffix_sdc:*:*:*:*:*:*:*:* versions from 5.0.0 to 5.1.0 (inclusive)

Tenable Plugins

View all (83 total)

IDNameProductFamilySeverity
150662SUSE SLES11 Security Update : kernel (SUSE-SU-2019:14089-1)NessusSuSE Local Security Checks
high
150074ArubaOS-CX < 10.3.0001 (ARUBA-PSA-2020-010)NessusMisc.
high
145651CentOS 8 : kernel (CESA-2019:1479)NessusCentOS Local Security Checks
high
138345Arista Networks CloudVision Portal Linux Kernel TCP Multiple DoS (SA0041)NessusMisc.
high
134891Check Point Gaia Operating System Administrator password truncation (sk156192)NessusFirewalls
high
134303Arista Networks EOS Linux Kernel TCP Multiple DoS (SA0041)NessusMisc.
high
133458Virtuozzo 7 : readykernel-patch (VZA-2019-068)NessusVirtuozzo Local Security Checks
high
133456Virtuozzo 7 : readykernel-patch (VZA-2019-050)NessusVirtuozzo Local Security Checks
high
132257RancherOS < 1.5.3 Multiple Vulnerabilities (SACK Panic)NessusMisc.
high
130950SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2950-1) (SACK Panic)NessusSuSE Local Security Checks
critical
720312Siemens Industrial Products Integer Overflow or Wraparound or Uncontrolled Resource Consumption (ICSA-19-253-03)Nessus Network MonitorSCADA
high
130423SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2821-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
129316F5 Networks BIG-IP : Linux SACK Panic vulnerability (K78234183) (SACK Panic)NessusF5 Networks Local Security Checks
high
129302Palo Alto Networks PAN-OS 7.1.x < 7.1.24 / 8.0.x < 8.0.19 / 8.1.x < 8.1.8-h5 / 9.0.x < 9.0.2-h4 Multiple VulnerabilitiesNessusPalo Alto Local Security Checks
high
129284SUSE SLED15 / SLES15 Security Update : kernel-source-rt (SUSE-SU-2019:2430-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (SACK Panic) (SACK Slowness) (Spectre)NessusSuSE Local Security Checks
high
128689NewStart CGSL MAIN 4.06 : kernel Multiple Vulnerabilities (NS-SA-2019-0177)NessusNewStart CGSL Local Security Checks
high
127590Oracle Linux 8 : kernel (ELSA-2019-1479) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
127456NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0168)NessusNewStart CGSL Local Security Checks
high
127451NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0165)NessusNewStart CGSL Local Security Checks
high
127450NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0165)NessusNewStart CGSL Local Security Checks
medium
127445NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0162)NessusNewStart CGSL Local Security Checks
high
127444NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0162)NessusNewStart CGSL Local Security Checks
high
127029EulerOS 2.0 SP8 : kernel (EulerOS-SA-2019-1792)NessusHuawei Local Security Checks
high
126983SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1948-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126981SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1924-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126763Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (SACK Panic) (SACK Slowness)NessusScientific Linux Local Security Checks
high
126559RHEL 7 : Virtualization Manager (RHSA-2019:1699) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
126544EulerOS Virtualization for ARM 64 3.0.2.0 : kernel (EulerOS-SA-2019-1702)NessusHuawei Local Security Checks
medium
126433EulerOS 2.0 SP5 : kernel (EulerOS-SA-2019-1692)NessusHuawei Local Security Checks
medium
126301RHEL 7 : Virtualization Manager (RHSA-2019:1594) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
126299EulerOS 2.0 SP3 : kernel (EulerOS-SA-2019-1672)NessusHuawei Local Security Checks
high
126266EulerOS 2.0 SP2 : kernel (EulerOS-SA-2019-1639)NessusHuawei Local Security Checks
high
126250RHEL 7 : kernel-alt (RHSA-2019:1602) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
126240SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1692-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126176Photon OS 1.0: Linux PHSA-2019-1.0-0240NessusPhotonOS Local Security Checks
high
126175Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2019-052)NessusVirtuozzo Local Security Checks
high
126171SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1671-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126170SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1668-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126106Photon OS 2.0: Linux PHSA-2019-2.0-0165NessusPhotonOS Local Security Checks
critical
126059openSUSE Security Update : the Linux Kernel (openSUSE-2019-1571) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126057RHEL 6 : MRG (RHSA-2019:1487) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
126045SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1550-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (SACK Panic) (SACK Slowness) (Spectre)NessusSuSE Local Security Checks
high
126040openSUSE Security Update : the Linux Kernel (openSUSE-2019-1579) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126033openSUSE Security Update : the Linux Kernel (openSUSE-2019-1570) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126031Slackware 14.2 / current : kernel (SSA:2019-169-01) (SACK Panic) (SACK Slowness)NessusSlackware Local Security Checks
high
126023Oracle Linux 6 : kernel (ELSA-2019-1488) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
126022Oracle Linux 7 : kernel (ELSA-2019-1481) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
126020OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0026) (SACK Panic) (SACK Slowness)NessusOracleVM Local Security Checks
high
126017Fedora 29 : kernel / kernel-headers (2019-914542e05c) (SACK Panic) (SACK Slowness)NessusFedora Local Security Checks
high
126016Fedora 30 : kernel / kernel-headers (2019-6c3d89b3d0) (SACK Panic) (SACK Slowness)NessusFedora Local Security Checks
high
126009Debian DLA-1824-1 : linux-4.9 security update (SACK Panic) (SACK Slowness)NessusDebian Local Security Checks
high
126007CentOS 6 : kernel (CESA-2019:1488) (SACK Panic) (SACK Slowness)NessusCentOS Local Security Checks
high
126006CentOS 7 : kernel (CESA-2019:1481) (SACK Panic) (SACK Slowness)NessusCentOS Local Security Checks
high
125998Ubuntu 16.04 LTS / 18.04 LTS / 18.10 / 19.04 : Linux kernel vulnerabilities (USN-4017-1) (SACK Panic) (SACK Slowness)NessusUbuntu Local Security Checks
high
125997SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1536-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125996SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1535-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125995SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1534-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125994SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1533-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125993SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:1532-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125992SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:1530-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125991SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1529-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125990SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1527-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125981Scientific Linux Security Update : kernel on SL7.x x86_64 (20190617) (SACK Panic) (SACK Slowness)NessusScientific Linux Local Security Checks
high
125980Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20190617) (SACK Panic) (SACK Slowness)NessusScientific Linux Local Security Checks
high
125977RHEL 6 : kernel (RHSA-2019:1490) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125976RHEL 6 : kernel (RHSA-2019:1489) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125975RHEL 6 : kernel (RHSA-2019:1488) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125974RHEL 7 : kernel-rt (RHSA-2019:1486) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125973RHEL 7 : kernel (RHSA-2019:1485) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125972RHEL 7 : kernel (RHSA-2019:1484) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125971RHEL 7 : kernel (RHSA-2019:1483) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125970RHEL 7 : kernel (RHSA-2019:1482) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125969RHEL 7 : kernel (RHSA-2019:1481) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125968RHEL 8 : kernel-rt (RHSA-2019:1480) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125967RHEL 8 : kernel (RHSA-2019:1479) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125966Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2019-4689) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
125965Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4686) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
125964Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2019-4685) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
125963Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4684) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
125959Debian DSA-4465-1 : linux - security update (SACK Panic) (SACK Slowness)NessusDebian Local Security Checks
high
125958Debian DLA-1823-1 : linux security update (SACK Panic) (SACK Slowness)NessusDebian Local Security Checks
high
125955Amazon Linux AMI : kernel (ALAS-2019-1222) (SACK Panic) (SACK Slowness)NessusAmazon Linux Local Security Checks
high
125954Amazon Linux 2 : kernel (ALAS-2019-1222) (SACK Panic) (SACK Slowness)NessusAmazon Linux Local Security Checks
high