SynopsisThe remote host is missing a vendor-supplied security patch.
DescriptionThe remote host is running a version of the Gaia Operating System which is affected by multiple vulnerabilities involving the Linux Kernel's handling of TCP networking.
- It is possible to overflow the 16bit width of TCP_SKB_CB(skb)->tcp_gso_segs which could result in the system crashing resulting in a Denial of Service. (CVE-2019-11477)
- It is possible to fragment the TCP retransmission queue in tcp_fragment in the Linux Kernel when handling specific TCP Selective Acknowledgement sequences. This could be abused by an atacker to cause a Denial of Service. (CVE-2019-11478)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
SolutionApply the relevant patch and fix referenced in the vendor advisory.