CVE-2019-11479

MEDIUM

Description

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

References

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt

http://www.openwall.com/lists/oss-security/2019/06/28/2

http://www.openwall.com/lists/oss-security/2019/07/06/3

http://www.openwall.com/lists/oss-security/2019/07/06/4

http://www.securityfocus.com/bid/108818

https://access.redhat.com/errata/RHSA-2019:1594

https://access.redhat.com/errata/RHSA-2019:1602

https://access.redhat.com/errata/RHSA-2019:1699

https://access.redhat.com/security/vulnerabilities/tcpsack

https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf

https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=5f3e2bf008c2221478101ee72f5cb4654b9fc363

https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=967c05aee439e6e5d7d805e195b3a20ef5c433d6

https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md

https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193

https://kc.mcafee.com/corporate/index?page=content&id=SB10287

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0008

https://security.netapp.com/advisory/ntap-20190625-0001/

https://support.f5.com/csp/article/K35421172

https://support.f5.com/csp/article/K35421172?utm_source=f5support&utm_medium=RSS

https://usn.ubuntu.com/4041-1/

https://usn.ubuntu.com/4041-2/

https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic

https://www.kb.cert.org/vuls/id/905115

https://www.oracle.com/security-alerts/cpujan2020.html

https://www.oracle.com/security-alerts/cpuoct2020.html

https://www.synology.com/security/advisory/Synology_SA_19_28

https://www.us-cert.gov/ics/advisories/icsa-19-253-03

https://www.us-cert.gov/ics/advisories/icsma-20-170-06

Details

Source: MITRE

Published: 2019-06-19

Updated: 2020-10-20

Type: CWE-770

Risk Information

CVSS v2.0

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3.0

Base Score: 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*

Configuration 7

OR

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*

Configuration 8

OR

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*

Configuration 9

OR

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*

Configuration 10

OR

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*

Configuration 11

OR

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*

Configuration 12

OR

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*

Configuration 13

OR

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*

Configuration 14

OR

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*

cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*

Configuration 15

OR

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

Configuration 16

OR

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 17

OR

cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:* versions from 5.1.0 to 5.4.0 (inclusive)

cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:* versions from 6.0.0 to 6.1.0 (inclusive)

cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*

cpe:2.3:a:f5:iworkflow:2.3.0:*:*:*:*:*:*:*

cpe:2.3:a:f5:traffix_sdc:*:*:*:*:*:*:*:* versions from 5.0.0 to 5.1.0 (inclusive)

Configuration 18

AND

OR

cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*

OR

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Tenable Plugins

View all (71 total)

IDNameProductFamilySeverity
145651CentOS 8 : kernel (CESA-2019:1479)NessusCentOS Local Security Checks
high
138345Arista Networks CloudVision Portal Linux Kernel TCP Multiple DoS (SA0041)NessusMisc.
high
134303Arista Networks EOS Linux Kernel TCP Multiple DoS (SA0041)NessusMisc.
high
132257RancherOS < 1.5.3 Multiple Vulnerabilities (SACK Panic)NessusMisc.
high
129313F5 Networks BIG-IP : Excess resource consumption due to low MSS values vulnerability (K35421172) (SACK Slowness)NessusF5 Networks Local Security Checks
medium
129302Palo Alto Networks PAN-OS 7.1.x < 7.1.24 / 8.0.x < 8.0.19 / 8.1.x < 8.1.8-h5 / 9.0.x < 9.0.2-h4 Multiple VulnerabilitiesNessusPalo Alto Local Security Checks
high
129284SUSE SLED15 / SLES15 Security Update : kernel-source-rt (SUSE-SU-2019:2430-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (SACK Panic) (SACK Slowness) (Spectre)NessusSuSE Local Security Checks
high
128689NewStart CGSL MAIN 4.06 : kernel Multiple Vulnerabilities (NS-SA-2019-0177)NessusNewStart CGSL Local Security Checks
high
127590Oracle Linux 8 : kernel (ELSA-2019-1479) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
127456NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0168)NessusNewStart CGSL Local Security Checks
high
127451NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0165)NessusNewStart CGSL Local Security Checks
high
127450NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0165)NessusNewStart CGSL Local Security Checks
medium
127445NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0162)NessusNewStart CGSL Local Security Checks
high
127444NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0162)NessusNewStart CGSL Local Security Checks
high
127029EulerOS 2.0 SP8 : kernel (EulerOS-SA-2019-1792)NessusHuawei Local Security Checks
medium
126763Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (SACK Panic) (SACK Slowness)NessusScientific Linux Local Security Checks
high
126559RHEL 7 : Virtualization Manager (RHSA-2019:1699) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
126544EulerOS Virtualization for ARM 64 3.0.2.0 : kernel (EulerOS-SA-2019-1702)NessusHuawei Local Security Checks
low
126433EulerOS 2.0 SP5 : kernel (EulerOS-SA-2019-1692)NessusHuawei Local Security Checks
low
126374Ubuntu 16.04 LTS / 18.04 LTS / 18.10 / 19.04 : Linux kernel update (USN-4041-1) (SACK Slowness)NessusUbuntu Local Security Checks
medium
126301RHEL 7 : Virtualization Manager (RHSA-2019:1594) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
126299EulerOS 2.0 SP3 : kernel (EulerOS-SA-2019-1672)NessusHuawei Local Security Checks
high
126266EulerOS 2.0 SP2 : kernel (EulerOS-SA-2019-1639)NessusHuawei Local Security Checks
high
126250RHEL 7 : kernel-alt (RHSA-2019:1602) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
126240SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1692-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126176Photon OS 1.0: Linux PHSA-2019-1.0-0240NessusPhotonOS Local Security Checks
high
126175Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2019-052)NessusVirtuozzo Local Security Checks
high
126106Photon OS 2.0: Linux PHSA-2019-2.0-0165NessusPhotonOS Local Security Checks
high
126059openSUSE Security Update : the Linux Kernel (openSUSE-2019-1571) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126057RHEL 6 : MRG (RHSA-2019:1487) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
medium
126045SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1550-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (SACK Panic) (SACK Slowness) (Spectre)NessusSuSE Local Security Checks
high
126040openSUSE Security Update : the Linux Kernel (openSUSE-2019-1579) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126033openSUSE Security Update : the Linux Kernel (openSUSE-2019-1570) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
126031Slackware 14.2 / current : kernel (SSA:2019-169-01) (SACK Panic) (SACK Slowness)NessusSlackware Local Security Checks
high
126023Oracle Linux 6 : kernel (ELSA-2019-1488) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
126022Oracle Linux 7 : kernel (ELSA-2019-1481) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
126020OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0026) (SACK Panic) (SACK Slowness)NessusOracleVM Local Security Checks
high
126017Fedora 29 : kernel / kernel-headers (2019-914542e05c) (SACK Panic) (SACK Slowness)NessusFedora Local Security Checks
high
126016Fedora 30 : kernel / kernel-headers (2019-6c3d89b3d0) (SACK Panic) (SACK Slowness)NessusFedora Local Security Checks
high
126009Debian DLA-1824-1 : linux-4.9 security update (SACK Panic) (SACK Slowness)NessusDebian Local Security Checks
high
126007CentOS 6 : kernel (CESA-2019:1488) (SACK Panic) (SACK Slowness)NessusCentOS Local Security Checks
high
126006CentOS 7 : kernel (CESA-2019:1481) (SACK Panic) (SACK Slowness)NessusCentOS Local Security Checks
high
125997SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1536-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125996SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1535-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125995SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1534-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125994SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1533-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125993SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:1532-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125992SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:1530-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125991SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1529-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125990SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1527-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
125981Scientific Linux Security Update : kernel on SL7.x x86_64 (20190617) (SACK Panic) (SACK Slowness)NessusScientific Linux Local Security Checks
high
125980Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20190617) (SACK Panic) (SACK Slowness)NessusScientific Linux Local Security Checks
high
125977RHEL 6 : kernel (RHSA-2019:1490) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125976RHEL 6 : kernel (RHSA-2019:1489) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125975RHEL 6 : kernel (RHSA-2019:1488) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125974RHEL 7 : kernel-rt (RHSA-2019:1486) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125973RHEL 7 : kernel (RHSA-2019:1485) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125972RHEL 7 : kernel (RHSA-2019:1484) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125971RHEL 7 : kernel (RHSA-2019:1483) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
medium
125970RHEL 7 : kernel (RHSA-2019:1482) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125969RHEL 7 : kernel (RHSA-2019:1481) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125968RHEL 8 : kernel-rt (RHSA-2019:1480) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125967RHEL 8 : kernel (RHSA-2019:1479) (SACK Panic) (SACK Slowness)NessusRed Hat Local Security Checks
high
125966Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2019-4689) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
125965Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4686) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
125964Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2019-4685) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
125963Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4684) (SACK Panic) (SACK Slowness)NessusOracle Linux Local Security Checks
high
125959Debian DSA-4465-1 : linux - security update (SACK Panic) (SACK Slowness)NessusDebian Local Security Checks
high
125958Debian DLA-1823-1 : linux security update (SACK Panic) (SACK Slowness)NessusDebian Local Security Checks
high
125955Amazon Linux AMI : kernel (ALAS-2019-1222) (SACK Panic) (SACK Slowness)NessusAmazon Linux Local Security Checks
high
125954Amazon Linux 2 : kernel (ALAS-2019-1222) (SACK Panic) (SACK Slowness)NessusAmazon Linux Local Security Checks
high