Логотип exploitDog
bind:"CVE-2019-11478" OR bind:"CVE-2019-11479" OR bind:"CVE-2019-11477"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-11478" OR bind:"CVE-2019-11479" OR bind:"CVE-2019-11477"

Количество 61

Количество 61

suse-cvrf логотип

SUSE-SU-2019:2450-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1536-1

около 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
ubuntu логотип

CVE-2019-11479

около 6 лет назад

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2019-11479

около 6 лет назад

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

CVSS3: 5.3
EPSS: Средний
nvd логотип

CVE-2019-11479

около 6 лет назад

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2019-11479

около 6 лет назад

Jonathan Looney discovered that the Linux kernel default MSS is hard-c ...

CVSS3: 7.5
EPSS: Средний
ubuntu логотип

CVE-2019-11477

около 6 лет назад

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

CVSS3: 7.5
EPSS: Высокий
redhat логотип

CVE-2019-11477

около 6 лет назад

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

CVSS3: 7.5
EPSS: Высокий
nvd логотип

CVE-2019-11477

около 6 лет назад

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

CVSS3: 7.5
EPSS: Высокий
debian логотип

CVE-2019-11477

около 6 лет назад

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs valu ...

CVSS3: 7.5
EPSS: Высокий
github логотип

GHSA-99cq-xr7g-h22w

около 3 лет назад

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2019-02196

около 6 лет назад

Уязвимость ядра операционной системы Linux, вызванная ошибками при обработке сегментов минимального размера, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-748j-px2m-cwgh

около 3 лет назад

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

CVSS3: 7.5
EPSS: Высокий
fstec логотип

BDU:2019-02194

около 6 лет назад

Уязвимость механизма TCP Selective Acknowledgement ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2019:1851-1

почти 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1855-1

почти 6 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4850

больше 5 лет назад

ELSA-2019-4850: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2069-1

почти 6 лет назад

Security update for the Linux Kernel for Azure

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2756-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2950-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2019:2450-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:1536-1

Security update for the Linux Kernel

около 6 лет назад
ubuntu логотип
CVE-2019-11479

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

CVSS3: 7.5
12%
Средний
около 6 лет назад
redhat логотип
CVE-2019-11479

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

CVSS3: 5.3
12%
Средний
около 6 лет назад
nvd логотип
CVE-2019-11479

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

CVSS3: 7.5
12%
Средний
около 6 лет назад
debian логотип
CVE-2019-11479

Jonathan Looney discovered that the Linux kernel default MSS is hard-c ...

CVSS3: 7.5
12%
Средний
около 6 лет назад
ubuntu логотип
CVE-2019-11477

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

CVSS3: 7.5
76%
Высокий
около 6 лет назад
redhat логотип
CVE-2019-11477

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

CVSS3: 7.5
76%
Высокий
около 6 лет назад
nvd логотип
CVE-2019-11477

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

CVSS3: 7.5
76%
Высокий
около 6 лет назад
debian логотип
CVE-2019-11477

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs valu ...

CVSS3: 7.5
76%
Высокий
около 6 лет назад
github логотип
GHSA-99cq-xr7g-h22w

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.

CVSS3: 7.5
12%
Средний
около 3 лет назад
fstec логотип
BDU:2019-02196

Уязвимость ядра операционной системы Linux, вызванная ошибками при обработке сегментов минимального размера, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
12%
Средний
около 6 лет назад
github логотип
GHSA-748j-px2m-cwgh

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.

CVSS3: 7.5
76%
Высокий
около 3 лет назад
fstec логотип
BDU:2019-02194

Уязвимость механизма TCP Selective Acknowledgement ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
76%
Высокий
около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1851-1

Security update for the Linux Kernel

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1855-1

Security update for the Linux Kernel

почти 6 лет назад
oracle-oval логотип
ELSA-2019-4850

ELSA-2019-4850: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:2069-1

Security update for the Linux Kernel for Azure

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2756-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:2950-1

Security update for the Linux Kernel

больше 5 лет назад

Уязвимостей на страницу