CVE-2019-11478

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.

References

https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e

https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md

https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic

https://access.redhat.com/security/vulnerabilities/tcpsack

https://support.f5.com/csp/article/K26618426

http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html

https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193

https://www.kb.cert.org/vuls/id/905115

https://www.synology.com/security/advisory/Synology_SA_19_28

https://security.netapp.com/advisory/ntap-20190625-0001/

https://access.redhat.com/errata/RHSA-2019:1594

https://access.redhat.com/errata/RHSA-2019:1602

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0007

https://kc.mcafee.com/corporate/index?page=content&id=SB10287

http://www.openwall.com/lists/oss-security/2019/06/28/2

http://www.vmware.com/security/advisories/VMSA-2019-0010.html

http://www.openwall.com/lists/oss-security/2019/07/06/3

http://www.openwall.com/lists/oss-security/2019/07/06/4

https://access.redhat.com/errata/RHSA-2019:1699

https://seclists.org/bugtraq/2019/Jul/30

http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html

https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf

https://www.us-cert.gov/ics/advisories/icsa-19-253-03

http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html

http://www.openwall.com/lists/oss-security/2019/10/24/1

http://www.openwall.com/lists/oss-security/2019/10/29/3

https://www.oracle.com/security-alerts/cpujan2020.html

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt

https://www.oracle.com/security-alerts/cpuoct2020.html

Details

Source: MITRE

Published: 2019-06-19

Updated: 2020-10-20

Type: CWE-400

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

Configuration 4

OR

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

Configuration 5

OR

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

Configuration 7

OR

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

Configuration 8

OR

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

Configuration 9

OR

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

Configuration 10

OR

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*

Configuration 11

OR

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

Configuration 12

OR

cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

Configuration 13

OR

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*

Configuration 14

OR

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 12.1.0 to 12.1.4 (inclusive)

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 13.1.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:* versions from 11.5.2 to 11.6.4 (inclusive)

Configuration 15

OR

cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

Configuration 16

OR

cpe:2.3:a:redhat:enterprise_linux_atomic_host:-:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_aus:6.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_aus:6.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

Configuration 17

OR

cpe:2.3:a:pulsesecure:pulse_policy_secure:-:*:*:*:*:*:*:*

cpe:2.3:a:pulsesecure:pulse_secure_virtual_application_delivery_controller:-:*:*:*:*:*:*:*

cpe:2.3:a:pulsesecure:pulse_connect_secure:-:*:*:*:*:*:*:*

Configuration 18

OR

cpe:2.3:a:f5:traffix_sdc:*:*:*:*:*:*:*:* versions from 5.0.0 to 5.1.0 (inclusive)

Tenable Plugins

View all (83 total)

IDNameProductFamilySeverity
150662SUSE SLES11 Security Update : kernel (SUSE-SU-2019:14089-1)NessusSuSE Local Security Checks
high
150074ArubaOS-CX < 10.3.0001 (ARUBA-PSA-2020-010)NessusMisc.
high
145651CentOS 8 : kernel (CESA-2019:1479)NessusCentOS Local Security Checks
high
138345Arista Networks CloudVision Portal Linux Kernel TCP Multiple DoS (SA0041)NessusMisc.
high
134891Check Point Gaia Operating System Administrator password truncation (sk156192)NessusFirewalls
high
134303Arista Networks EOS Linux Kernel TCP Multiple DoS (SA0041)NessusMisc.
high
133456Virtuozzo 7 : readykernel-patch (VZA-2019-050)NessusVirtuozzo Local Security Checks
high
132257RancherOS < 1.5.3 Multiple Vulnerabilities (SACK Panic)NessusMisc.
high
130423SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2821-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
129310F5 Networks BIG-IP : Linux SACK Slowness vulnerability (K26618426) (SACK Slowness)NessusF5 Networks Local Security Checks
high
129302Palo Alto Networks PAN-OS 7.1.x < 7.1.24 / 8.0.x < 8.0.19 / 8.1.x < 8.1.8-h5 / 9.0.x < 9.0.2-h4 Multiple VulnerabilitiesNessusPalo Alto Local Security Checks
high
129284SUSE SLED15 / SLES15 Security Update : kernel-source-rt (SUSE-SU-2019:2430-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (SACK Panic) (SACK Slowness) (Spectre)NessusSuSE Local Security Checks
high
128689NewStart CGSL MAIN 4.06 : kernel Multiple Vulnerabilities (NS-SA-2019-0177)NessusNewStart CGSL Local Security Checks
high
127590Oracle Linux 8 : kernel (ELSA-2019-1479)NessusOracle Linux Local Security Checks
high
127456NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0168)NessusNewStart CGSL Local Security Checks
high
127451NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0165)NessusNewStart CGSL Local Security Checks
high
127450NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0165)NessusNewStart CGSL Local Security Checks
medium
127445NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0162)NessusNewStart CGSL Local Security Checks
high
127444NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0162)NessusNewStart CGSL Local Security Checks
high
127029EulerOS 2.0 SP8 : kernel (EulerOS-SA-2019-1792)NessusHuawei Local Security Checks
high
126983SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1948-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126982SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1935-1) (SACK Slowness)NessusSuSE Local Security Checks
high
126981SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1924-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126811SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1870-1) (SACK Slowness)NessusSuSE Local Security Checks
high
126763Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (SACK Panic) (SACK Slowness)NessusScientific Linux Local Security Checks
high
126744SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1855-1) (SACK Slowness)NessusSuSE Local Security Checks
high
126741SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:1851-1) (SACK Slowness)NessusSuSE Local Security Checks
high
126559RHEL 7 : Virtualization Manager (RHSA-2019:1699) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
126544EulerOS Virtualization for ARM 64 3.0.2.0 : kernel (EulerOS-SA-2019-1702)NessusHuawei Local Security Checks
medium
126433EulerOS 2.0 SP5 : kernel (EulerOS-SA-2019-1692)NessusHuawei Local Security Checks
medium
126301RHEL 7 : Virtualization Manager (RHSA-2019:1594) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
126299EulerOS 2.0 SP3 : kernel (EulerOS-SA-2019-1672)NessusHuawei Local Security Checks
high
126266EulerOS 2.0 SP2 : kernel (EulerOS-SA-2019-1639)NessusHuawei Local Security Checks
high
126250RHEL 7 : kernel-alt (RHSA-2019:1602) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
126240SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1692-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126176Photon OS 1.0: Linux PHSA-2019-1.0-0240NessusPhotonOS Local Security Checks
high
126175Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2019-052)NessusVirtuozzo Local Security Checks
high
126171SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1671-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126170SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1668-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126106Photon OS 2.0: Linux PHSA-2019-2.0-0165NessusPhotonOS Local Security Checks
critical
126059openSUSE Security Update : the Linux Kernel (openSUSE-2019-1571) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126057RHEL 6 : MRG (RHSA-2019:1487) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
126045SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1550-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (SACK Panic) (SACK Slowness) (Spectre)NessusSuSE Local Security Checks
high
126040openSUSE Security Update : the Linux Kernel (openSUSE-2019-1579) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126033openSUSE Security Update : the Linux Kernel (openSUSE-2019-1570) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126031Slackware 14.2 / current : kernel (SSA:2019-169-01) (SACK Panic) (SACK Slowness)NessusSlackware Local Security Checks
high
126023Oracle Linux 6 : kernel (ELSA-2019-1488)NessusOracle Linux Local Security Checks
high
126022Oracle Linux 7 : kernel (ELSA-2019-1481)NessusOracle Linux Local Security Checks
high
126020OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0026) (SACK Panic) (SACK Slowness)NessusOracleVM Local Security Checks
high
126017Fedora 29 : kernel / kernel-headers (2019-914542e05c) (SACK Panic) (SACK Slowness)NessusFedora Local Security Checks
high
126016Fedora 30 : kernel / kernel-headers (2019-6c3d89b3d0) (SACK Panic) (SACK Slowness)NessusFedora Local Security Checks
high
126009Debian DLA-1824-1 : linux-4.9 security update (SACK Panic) (SACK Slowness)NessusDebian Local Security Checks
high
126007CentOS 6 : kernel (CESA-2019:1488) (SACK Panic) (SACK Slowness)NessusCentOS Local Security Checks
high
126006CentOS 7 : kernel (CESA-2019:1481) (SACK Panic) (SACK Slowness)NessusCentOS Local Security Checks
high
125998Ubuntu 16.04 LTS / 18.04 LTS / 18.10 / 19.04 : Linux kernel vulnerabilities (USN-4017-1) (SACK Panic) (SACK Slowness)NessusUbuntu Local Security Checks
high
125996SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1535-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125995SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1534-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125994SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1533-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125993SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:1532-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125992SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:1530-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125991SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1529-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125990SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1527-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125981Scientific Linux Security Update : kernel on SL7.x x86_64 (20190617) (SACK Panic) (SACK Slowness)NessusScientific Linux Local Security Checks
high
125980Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20190617) (SACK Panic) (SACK Slowness)NessusScientific Linux Local Security Checks
high
125977RHEL 6 : kernel (RHSA-2019:1490) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125976RHEL 6 : kernel (RHSA-2019:1489) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125975RHEL 6 : kernel (RHSA-2019:1488) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125974RHEL 7 : kernel-rt (RHSA-2019:1486) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125973RHEL 7 : kernel (RHSA-2019:1485) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125972RHEL 7 : kernel (RHSA-2019:1484) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125971RHEL 7 : kernel (RHSA-2019:1483) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125970RHEL 7 : kernel (RHSA-2019:1482) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125969RHEL 7 : kernel (RHSA-2019:1481) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125968RHEL 8 : kernel-rt (RHSA-2019:1480) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125967RHEL 8 : kernel (RHSA-2019:1479) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125966Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2019-4689)NessusOracle Linux Local Security Checks
high
125965Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4686)NessusOracle Linux Local Security Checks
high
125964Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2019-4685)NessusOracle Linux Local Security Checks
high
125963Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4684)NessusOracle Linux Local Security Checks
high
125959Debian DSA-4465-1 : linux - security update (SACK Panic) (SACK Slowness)NessusDebian Local Security Checks
high
125958Debian DLA-1823-1 : linux security update (SACK Panic) (SACK Slowness)NessusDebian Local Security Checks
high
125955Amazon Linux AMI : kernel (ALAS-2019-1222) (SACK Panic) (SACK Slowness)NessusAmazon Linux Local Security Checks
high
125954Amazon Linux 2 : kernel (ALAS-2019-1222) (SACK Panic) (SACK Slowness)NessusAmazon Linux Local Security Checks
high