Количество 45
Количество 45

BDU:2019-02195
Уязвимость механизма TCP Selective Acknowledgement ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVE-2019-11478
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.

CVE-2019-11478
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.

CVE-2019-11478
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.
CVE-2019-11478
Jonathan Looney discovered that the TCP retransmission queue implement ...

SUSE-SU-2019:1935-1
Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3)

SUSE-SU-2019:1888-1
Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP1)
GHSA-xh2h-cw6h-x9h5
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.

SUSE-SU-2019:1924-1
Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP1)

SUSE-SU-2019:1889-1
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP1)

SUSE-SU-2019:1948-1
Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3)

SUSE-SU-2019:1882-1
Security update for the Linux Kernel (Live Patch 10 for SLE 15)
ELSA-2019-4689
ELSA-2019-4689: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4686
ELSA-2019-4686: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4684
ELSA-2019-4684: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-4678
ELSA-2019-4678: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2019-1481
ELSA-2019-1481: kernel security update (IMPORTANT)

ADV190020
Linux Kernel TCP SACK Denial of Service Vulnerability

SUSE-SU-2019:1671-1
Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2)

SUSE-SU-2019:1668-1
Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP1)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2019-02195 Уязвимость механизма TCP Selective Acknowledgement ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 28% Средний | около 6 лет назад |
![]() | CVE-2019-11478 Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e. | CVSS3: 5.3 | 28% Средний | около 6 лет назад |
![]() | CVE-2019-11478 Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e. | CVSS3: 5.3 | 28% Средний | около 6 лет назад |
![]() | CVE-2019-11478 Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e. | CVSS3: 5.3 | 28% Средний | около 6 лет назад |
CVE-2019-11478 Jonathan Looney discovered that the TCP retransmission queue implement ... | CVSS3: 5.3 | 28% Средний | около 6 лет назад | |
![]() | SUSE-SU-2019:1935-1 Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP3) | 28% Средний | почти 6 лет назад | |
![]() | SUSE-SU-2019:1888-1 Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP1) | 28% Средний | почти 6 лет назад | |
GHSA-xh2h-cw6h-x9h5 Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e. | CVSS3: 7.5 | 28% Средний | около 3 лет назад | |
![]() | SUSE-SU-2019:1924-1 Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP1) | почти 6 лет назад | ||
![]() | SUSE-SU-2019:1889-1 Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP1) | почти 6 лет назад | ||
![]() | SUSE-SU-2019:1948-1 Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP3) | почти 6 лет назад | ||
![]() | SUSE-SU-2019:1882-1 Security update for the Linux Kernel (Live Patch 10 for SLE 15) | почти 6 лет назад | ||
ELSA-2019-4689 ELSA-2019-4689: Unbreakable Enterprise kernel security update (IMPORTANT) | около 6 лет назад | |||
ELSA-2019-4686 ELSA-2019-4686: Unbreakable Enterprise kernel security update (IMPORTANT) | около 6 лет назад | |||
ELSA-2019-4684 ELSA-2019-4684: Unbreakable Enterprise kernel security update (IMPORTANT) | около 6 лет назад | |||
ELSA-2019-4678 ELSA-2019-4678: Unbreakable Enterprise kernel security update (IMPORTANT) | около 6 лет назад | |||
ELSA-2019-1481 ELSA-2019-1481: kernel security update (IMPORTANT) | около 6 лет назад | |||
![]() | ADV190020 Linux Kernel TCP SACK Denial of Service Vulnerability | почти 6 лет назад | ||
![]() | SUSE-SU-2019:1671-1 Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP2) | почти 6 лет назад | ||
![]() | SUSE-SU-2019:1668-1 Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP1) | почти 6 лет назад |
Уязвимостей на страницу