Количество 30
Количество 30

CVE-2019-11479
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

CVE-2019-11479
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

CVE-2019-11479
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.
CVE-2019-11479
Jonathan Looney discovered that the Linux kernel default MSS is hard-c ...
GHSA-99cq-xr7g-h22w
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

BDU:2019-02196
Уязвимость ядра операционной системы Linux, вызванная ошибками при обработке сегментов минимального размера, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2019-4689
ELSA-2019-4689: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4686
ELSA-2019-4686: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4684
ELSA-2019-4684: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4678
ELSA-2019-4678: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-1481
ELSA-2019-1481: kernel security update (IMPORTANT)

ADV190020
Linux Kernel TCP SACK Denial of Service Vulnerability
ELSA-2019-1488
ELSA-2019-1488: kernel security and bug fix update (IMPORTANT)
ELSA-2019-1479
ELSA-2019-1479: kernel security and bug fix update (IMPORTANT)
ELSA-2019-4685
ELSA-2019-4685: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2019:1692-1
Security update for the Linux Kernel

SUSE-SU-2019:1533-1
Security update for the Linux Kernel

SUSE-SU-2019:14089-1
Security update for the Linux Kernel

openSUSE-SU-2019:1571-1
Security update for the Linux Kernel

SUSE-SU-2019:1534-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2019-11479 Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363. | CVSS3: 7.5 | 12% Средний | около 6 лет назад |
![]() | CVE-2019-11479 Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363. | CVSS3: 5.3 | 12% Средний | около 6 лет назад |
![]() | CVE-2019-11479 Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363. | CVSS3: 7.5 | 12% Средний | около 6 лет назад |
CVE-2019-11479 Jonathan Looney discovered that the Linux kernel default MSS is hard-c ... | CVSS3: 7.5 | 12% Средний | около 6 лет назад | |
GHSA-99cq-xr7g-h22w Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363. | CVSS3: 7.5 | 12% Средний | около 3 лет назад | |
![]() | BDU:2019-02196 Уязвимость ядра операционной системы Linux, вызванная ошибками при обработке сегментов минимального размера, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 12% Средний | около 6 лет назад |
ELSA-2019-4689 ELSA-2019-4689: Unbreakable Enterprise kernel security update (IMPORTANT) | около 6 лет назад | |||
ELSA-2019-4686 ELSA-2019-4686: Unbreakable Enterprise kernel security update (IMPORTANT) | около 6 лет назад | |||
ELSA-2019-4684 ELSA-2019-4684: Unbreakable Enterprise kernel security update (IMPORTANT) | около 6 лет назад | |||
ELSA-2019-4678 ELSA-2019-4678: Unbreakable Enterprise kernel security update (IMPORTANT) | около 6 лет назад | |||
ELSA-2019-1481 ELSA-2019-1481: kernel security update (IMPORTANT) | около 6 лет назад | |||
![]() | ADV190020 Linux Kernel TCP SACK Denial of Service Vulnerability | почти 6 лет назад | ||
ELSA-2019-1488 ELSA-2019-1488: kernel security and bug fix update (IMPORTANT) | около 6 лет назад | |||
ELSA-2019-1479 ELSA-2019-1479: kernel security and bug fix update (IMPORTANT) | почти 6 лет назад | |||
ELSA-2019-4685 ELSA-2019-4685: Unbreakable Enterprise kernel security update (IMPORTANT) | около 6 лет назад | |||
![]() | SUSE-SU-2019:1692-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:1533-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2019:14089-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | openSUSE-SU-2019:1571-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2019:1534-1 Security update for the Linux Kernel | около 6 лет назад |
Уязвимостей на страницу