ID

VAR-201906-1175


CVE

CVE-2019-11477


TITLE

Linux kernel Input validation error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201906-681

DESCRIPTION

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff. A successful exploit could cause the targeted system to crash, resulting in a DoS condition. Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available. Kernel.org has confirmed the vulnerability and released software updates. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2019:1484-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:1484 Issue date: 2019-06-17 CVE Names: CVE-2019-11477 CVE-2019-11478 CVE-2019-11479 ==================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.3) - noarch, x86_64 Red Hat Enterprise Linux Server E4S (v. 7.3) - noarch, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.3) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.3) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.3) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.3) - noarch, x86_64 3. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477) * Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478) * Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * THP: Race between MADV_DONTNEED and NUMA hinting node migration code (BZ#1698104) * [RHEL7] md_clear flag missing from /proc/cpuinfo on late microcode update (BZ#1712990) * [RHEL7] MDS mitigations are not enabled after double microcode update (BZ#1712995) * WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:90 __static_key_slow_dec+0xa6/0xb0 (BZ#1713001) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1719123 - CVE-2019-11477 Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service 1719128 - CVE-2019-11478 Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service 1719129 - CVE-2019-11479 Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service 6. Package List: Red Hat Enterprise Linux Server AUS (v. 7.3): Source: kernel-3.10.0-514.66.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-514.66.2.el7.noarch.rpm kernel-doc-3.10.0-514.66.2.el7.noarch.rpm x86_64: kernel-3.10.0-514.66.2.el7.x86_64.rpm kernel-debug-3.10.0-514.66.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.66.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.66.2.el7.x86_64.rpm kernel-devel-3.10.0-514.66.2.el7.x86_64.rpm kernel-headers-3.10.0-514.66.2.el7.x86_64.rpm kernel-tools-3.10.0-514.66.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.66.2.el7.x86_64.rpm perf-3.10.0-514.66.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm python-perf-3.10.0-514.66.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.3): Source: kernel-3.10.0-514.66.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-514.66.2.el7.noarch.rpm kernel-doc-3.10.0-514.66.2.el7.noarch.rpm ppc64le: kernel-3.10.0-514.66.2.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-514.66.2.el7.ppc64le.rpm kernel-debug-3.10.0-514.66.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-514.66.2.el7.ppc64le.rpm kernel-debug-devel-3.10.0-514.66.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-514.66.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-514.66.2.el7.ppc64le.rpm kernel-devel-3.10.0-514.66.2.el7.ppc64le.rpm kernel-headers-3.10.0-514.66.2.el7.ppc64le.rpm kernel-tools-3.10.0-514.66.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-514.66.2.el7.ppc64le.rpm kernel-tools-libs-3.10.0-514.66.2.el7.ppc64le.rpm perf-3.10.0-514.66.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-514.66.2.el7.ppc64le.rpm python-perf-3.10.0-514.66.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-514.66.2.el7.ppc64le.rpm x86_64: kernel-3.10.0-514.66.2.el7.x86_64.rpm kernel-debug-3.10.0-514.66.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.66.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.66.2.el7.x86_64.rpm kernel-devel-3.10.0-514.66.2.el7.x86_64.rpm kernel-headers-3.10.0-514.66.2.el7.x86_64.rpm kernel-tools-3.10.0-514.66.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.66.2.el7.x86_64.rpm perf-3.10.0-514.66.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm python-perf-3.10.0-514.66.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 7.3): Source: kernel-3.10.0-514.66.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-514.66.2.el7.noarch.rpm kernel-doc-3.10.0-514.66.2.el7.noarch.rpm x86_64: kernel-3.10.0-514.66.2.el7.x86_64.rpm kernel-debug-3.10.0-514.66.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.66.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.66.2.el7.x86_64.rpm kernel-devel-3.10.0-514.66.2.el7.x86_64.rpm kernel-headers-3.10.0-514.66.2.el7.x86_64.rpm kernel-tools-3.10.0-514.66.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.66.2.el7.x86_64.rpm perf-3.10.0-514.66.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm python-perf-3.10.0-514.66.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 7.3): x86_64: kernel-debug-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.66.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.66.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional E4S (v. 7.3): ppc64le: kernel-debug-debuginfo-3.10.0-514.66.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-514.66.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-514.66.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-514.66.2.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-514.66.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-514.66.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-514.66.2.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.66.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.66.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 7.3): x86_64: kernel-debug-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.66.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.66.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.66.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-11477 https://access.redhat.com/security/cve/CVE-2019-11478 https://access.redhat.com/security/cve/CVE-2019-11479 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/tcpsack 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXQfsINzjgjWX9erEAQjaUQ/8C6tiqftF16m5kCHgGT8J4hTBwf13ddVv nS9rspU7yqCtzQIJGyw07Dm4dnCBYKf4WH1jL7522Wrjdk23B4PWDkUm9JHvSjeJ dgT48tgCI9uIqtg1S6pIeEo78UMjKdJbuK4Zh8+v2udHAXrrTHd39/d+vQM5Ry+/ RgYRJFuzuv4Ed5ztARI7VyHHScQl8aDwxm4JZ1gRlDl80kTSANRx4pt5ZeHDZ+Uk izWZdpCSYo9aZEW1MZLLKdKyNatC5xvWo/j2HPoDYhpUIz+NALsa8kRtbzdcngRr L8jAhXGjtFHiQjGPH2u08Wr1K4KF8VRi3xYV+BGELGoG9AFbDaRY44khdRU4hTtp RrdCgeeeP+PhiYfw6jUeh77AfSndYTsEpt+HM1krZ2Zn18EnbFIkBA6jTx22WtB7 cEvHS4cZ09EexivrBNWuHiV8WlUsMRC/rMEkXfk/Z3gdntHaPoKMnubt8O6ULLzG 7848ptUHmRHN1lqi2ey+r2Itz7IVwq9xWB0+ls4thnJQxqcTUNM7YI0UQW0v3q8p pFkUbB2LlnZYcsniIR5gMiYZc7xfMidPKzWTUAi22BaifsBWMPX6gInszsV53rRM xTQfgYcClS0Dg7Hj2kLwKpwGm1IA8g65ljO1NooaAp5tlaUcO0TyZUDrIdWZ7M2M Htgga2C1aeg\xa3py -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Kernel Live Patch Security Notice 0058-1 October 22, 2019 linux vulnerability ========================================================================== A security issue affects these releases of Ubuntu: | Series | Base kernel | Arch | flavors | |------------------+--------------+----------+------------------| | Ubuntu 18.04 LTS | 4.15.0 | amd64 | aws | | Ubuntu 18.04 LTS | 4.15.0 | amd64 | generic | | Ubuntu 18.04 LTS | 4.15.0 | amd64 | lowlatency | | Ubuntu 18.04 LTS | 4.15.0 | amd64 | oem | | Ubuntu 18.04 LTS | 5.0.0 | amd64 | azure | | Ubuntu 14.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 14.04 LTS | 4.4.0 | amd64 | lowlatency | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | aws | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | lowlatency | | Ubuntu 16.04 LTS | 4.15.0 | amd64 | azure | | Ubuntu 16.04 LTS | 4.15.0 | amd64 | generic | | Ubuntu 16.04 LTS | 4.15.0 | amd64 | lowlatency | Summary: Several security issues were fixed in the kernel. Software Description: - linux: Linux kernel Details: It was discovered that a race condition existed in the GFS2 file system in the Linux kernel. (CVE-2016-10905) It was discovered that a use-after-free error existed in the block layer subsystem of the Linux kernel when certain failure conditions occurred. (CVE-2018-20856) It was discovered that the USB gadget Midi driver in the Linux kernel contained a double-free vulnerability when handling certain error conditions. (CVE-2018-20961) It was discovered that the XFS file system in the Linux kernel did not properly handle mount failures in some situations. (CVE-2018-20976) It was discovered that the RSI 91x Wi-Fi driver in the Linux kernel did not did not handle detach operations correctly, leading to a use-after-free vulnerability. (CVE-2018-21008) It was discovered that the Intel Wi-Fi device driver in the Linux kernel did not properly validate certain Tunneled Direct Link Setup (TDLS). (CVE-2019-0136) It was discovered that the Linux kernel on ARM processors allowed a tracing process to modify a syscall after a seccomp decision had been made on that syscall. (CVE-2019-2181) It was discovered that the Marvell Wireless LAN device driver in the Linux kernel did not properly validate the BSS descriptor. (CVE-2019-3846) It was discovered that a heap buffer overflow existed in the Marvell Wireless LAN device driver for the Linux kernel. (CVE-2019-10126) It was discovered that the Bluetooth UART implementation in the Linux kernel did not properly check for missing tty operations. (CVE-2019-11478) It was discovered that the ext4 file system implementation in the Linux kernel did not properly zero out memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2019-11833) It was discovered that the PowerPC dlpar implementation in the Linux kernel did not properly check for allocation errors in some situations. (CVE-2019-12614) It was discovered that the floppy driver in the Linux kernel did not properly validate meta data, leading to a buffer overread. (CVE-2019-14283) It was discovered that the floppy driver in the Linux kernel did not properly validate ioctl() calls, leading to a division-by-zero. (CVE-2019-14284) Wen Huang discovered that the Marvell Wi-Fi device driver in the Linux kernel did not properly perform bounds checking, leading to a heap overflow. (CVE-2019-14814) Wen Huang discovered that the Marvell Wi-Fi device driver in the Linux kernel did not properly perform bounds checking, leading to a heap overflow. (CVE-2019-14815) Wen Huang discovered that the Marvell Wi-Fi device driver in the Linux kernel did not properly perform bounds checking, leading to a heap overflow. (CVE-2019-14816) Matt Delco discovered that the KVM hypervisor implementation in the Linux kernel did not properly perform bounds checking when handling coalesced MMIO write operations. (CVE-2019-14821) Peter Pi discovered a buffer overflow in the virtio network backend (vhost_net) implementation in the Linux kernel. (CVE-2019-14835) Update instructions: The problem can be corrected by updating your livepatches to the following versions: | Kernel | Version | flavors | |--------------------------+----------+--------------------------| | 4.4.0-148.174 | 58.1 | lowlatency, generic | | 4.4.0-148.174~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-150.176 | 58.1 | generic, lowlatency | | 4.4.0-150.176~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-151.178 | 58.1 | lowlatency, generic | | 4.4.0-151.178~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-154.181 | 58.1 | lowlatency, generic | | 4.4.0-154.181~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-157.185 | 58.1 | lowlatency, generic | | 4.4.0-157.185~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-159.187 | 58.1 | lowlatency, generic | | 4.4.0-159.187~14.04.1 | 58.1 | generic, lowlatency | | 4.4.0-161.189 | 58.1 | lowlatency, generic | | 4.4.0-161.189~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-164.192 | 58.1 | lowlatency, generic | | 4.4.0-164.192~14.04.1 | 58.1 | lowlatency, generic | | 4.4.0-165.193 | 58.1 | generic, lowlatency | | 4.4.0-1083.93 | 58.1 | aws | | 4.4.0-1084.94 | 58.1 | aws | | 4.4.0-1085.96 | 58.1 | aws | | 4.4.0-1087.98 | 58.1 | aws | | 4.4.0-1088.99 | 58.1 | aws | | 4.4.0-1090.101 | 58.1 | aws | | 4.4.0-1092.103 | 58.1 | aws | | 4.4.0-1094.105 | 58.1 | aws | | 4.15.0-50.54 | 58.1 | generic, lowlatency | | 4.15.0-50.54~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-51.55 | 58.1 | generic, lowlatency | | 4.15.0-51.55~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-52.56 | 58.1 | lowlatency, generic | | 4.15.0-52.56~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-54.58 | 58.1 | generic, lowlatency | | 4.15.0-54.58~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-55.60 | 58.1 | generic, lowlatency | | 4.15.0-58.64 | 58.1 | generic, lowlatency | | 4.15.0-58.64~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-60.67 | 58.1 | lowlatency, generic | | 4.15.0-60.67~16.04.1 | 58.1 | generic, lowlatency | | 4.15.0-62.69 | 58.1 | generic, lowlatency | | 4.15.0-62.69~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-64.73 | 58.1 | generic, lowlatency | | 4.15.0-64.73~16.04.1 | 58.1 | lowlatency, generic | | 4.15.0-65.74 | 58.1 | lowlatency, generic | | 4.15.0-1038.43 | 58.1 | oem | | 4.15.0-1039.41 | 58.1 | aws | | 4.15.0-1039.44 | 58.1 | oem | | 4.15.0-1040.42 | 58.1 | aws | | 4.15.0-1041.43 | 58.1 | aws | | 4.15.0-1043.45 | 58.1 | aws | | 4.15.0-1043.48 | 58.1 | oem | | 4.15.0-1044.46 | 58.1 | aws | | 4.15.0-1045.47 | 58.1 | aws | | 4.15.0-1045.50 | 58.1 | oem | | 4.15.0-1047.49 | 58.1 | aws | | 4.15.0-1047.51 | 58.1 | azure | | 4.15.0-1048.50 | 58.1 | aws | | 4.15.0-1049.54 | 58.1 | azure | | 4.15.0-1050.52 | 58.1 | aws | | 4.15.0-1050.55 | 58.1 | azure | | 4.15.0-1050.57 | 58.1 | oem | | 4.15.0-1051.53 | 58.1 | aws | | 4.15.0-1051.56 | 58.1 | azure | | 4.15.0-1052.57 | 58.1 | azure | | 4.15.0-1055.60 | 58.1 | azure | | 4.15.0-1056.61 | 58.1 | azure | | 4.15.0-1056.65 | 58.1 | oem | | 4.15.0-1057.62 | 58.1 | azure | | 4.15.0-1057.66 | 58.1 | oem | | 4.15.0-1059.64 | 58.1 | azure | | 5.0.0-1014.14~18.04.1 | 58.1 | azure | | 5.0.0-1016.17~18.04.1 | 58.1 | azure | | 5.0.0-1018.19~18.04.1 | 58.1 | azure | | 5.0.0-1020.21~18.04.1 | 58.1 | azure | Support Information: Kernels older than the levels listed below do not receive livepatch updates. Please upgrade your kernel as soon as possible. | Series | Version | Flavors | |------------------+------------------+--------------------------| | Ubuntu 18.04 LTS | 4.15.0-1039 | aws | | Ubuntu 16.04 LTS | 4.4.0-1083 | aws | | Ubuntu 18.04 LTS | 5.0.0-1000 | azure | | Ubuntu 16.04 LTS | 4.15.0-1047 | azure | | Ubuntu 18.04 LTS | 4.15.0-50 | generic lowlatency | | Ubuntu 16.04 LTS | 4.15.0-50 | generic lowlatency | | Ubuntu 14.04 LTS | 4.4.0-148 | generic lowlatency | | Ubuntu 18.04 LTS | 4.15.0-1038 | oem | | Ubuntu 16.04 LTS | 4.4.0-148 | generic lowlatency | References: CVE-2016-10905, CVE-2018-20856, CVE-2018-20961, CVE-2018-20976, CVE-2018-21008, CVE-2019-0136, CVE-2019-2054, CVE-2019-2181, CVE-2019-3846, CVE-2019-10126, CVE-2019-10207, CVE-2019-11477, CVE-2019-11478, CVE-2019-11833, CVE-2019-12614, CVE-2019-14283, CVE-2019-14284, CVE-2019-14814, CVE-2019-14815, CVE-2019-14816, CVE-2019-14821, CVE-2019-14835 -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce . Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Bug Fix(es): * update the MRG 2.5.z 3.10 kernel-rt sources (BZ#1711010) 4. (CVE-2019-11477) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 19.04: linux-image-5.0.0-1008-aws 5.0.0-1008.8 linux-image-5.0.0-1008-gcp 5.0.0-1008.8 linux-image-5.0.0-1008-kvm 5.0.0-1008.8 linux-image-5.0.0-1010-raspi2 5.0.0-1010.10 linux-image-5.0.0-1014-snapdragon 5.0.0-1014.14 linux-image-5.0.0-17-generic 5.0.0-17.18 linux-image-5.0.0-17-generic-lpae 5.0.0-17.18 linux-image-5.0.0-17-lowlatency 5.0.0-17.18 linux-image-aws 5.0.0.1008.8 linux-image-gcp 5.0.0.1008.8 linux-image-generic 5.0.0.17.18 linux-image-generic-lpae 5.0.0.17.18 linux-image-gke 5.0.0.1008.8 linux-image-kvm 5.0.0.1008.8 linux-image-lowlatency 5.0.0.17.18 linux-image-raspi2 5.0.0.1010.7 linux-image-snapdragon 5.0.0.1014.7 linux-image-virtual 5.0.0.17.18 Ubuntu 18.10: linux-image-4.18.0-1013-gcp 4.18.0-1013.14 linux-image-4.18.0-1014-kvm 4.18.0-1014.14 linux-image-4.18.0-1016-raspi2 4.18.0-1016.18 linux-image-4.18.0-1018-aws 4.18.0-1018.20 linux-image-4.18.0-1020-azure 4.18.0-1020.20 linux-image-4.18.0-22-generic 4.18.0-22.23 linux-image-4.18.0-22-generic-lpae 4.18.0-22.23 linux-image-4.18.0-22-lowlatency 4.18.0-22.23 linux-image-4.18.0-22-snapdragon 4.18.0-22.23 linux-image-aws 4.18.0.1018.18 linux-image-azure 4.18.0.1020.21 linux-image-gcp 4.18.0.1013.13 linux-image-generic 4.18.0.22.23 linux-image-generic-lpae 4.18.0.22.23 linux-image-gke 4.18.0.1013.13 linux-image-kvm 4.18.0.1014.14 linux-image-lowlatency 4.18.0.22.23 linux-image-raspi2 4.18.0.1016.13 linux-image-snapdragon 4.18.0.22.23 linux-image-virtual 4.18.0.22.23 Ubuntu 18.04 LTS: linux-image-4.15.0-1015-oracle 4.15.0-1015.17 linux-image-4.15.0-1034-gcp 4.15.0-1034.36 linux-image-4.15.0-1036-kvm 4.15.0-1036.36 linux-image-4.15.0-1038-raspi2 4.15.0-1038.40 linux-image-4.15.0-1041-aws 4.15.0-1041.43 linux-image-4.15.0-1043-oem 4.15.0-1043.48 linux-image-4.15.0-1055-snapdragon 4.15.0-1055.59 linux-image-4.15.0-52-generic 4.15.0-52.56 linux-image-4.15.0-52-generic-lpae 4.15.0-52.56 linux-image-4.15.0-52-lowlatency 4.15.0-52.56 linux-image-4.18.0-1020-azure 4.18.0-1020.20~18.04.1 linux-image-4.18.0-22-generic 4.18.0-22.23~18.04.1 linux-image-4.18.0-22-generic-lpae 4.18.0-22.23~18.04.1 linux-image-4.18.0-22-lowlatency 4.18.0-22.23~18.04.1 linux-image-4.18.0-22-snapdragon 4.18.0-22.23~18.04.1 linux-image-aws 4.15.0.1041.40 linux-image-azure 4.18.0.1020.19 linux-image-gcp 4.15.0.1034.36 linux-image-generic 4.15.0.52.54 linux-image-generic-hwe-18.04 4.18.0.22.72 linux-image-generic-lpae 4.15.0.52.54 linux-image-generic-lpae-hwe-18.04 4.18.0.22.72 linux-image-kvm 4.15.0.1036.36 linux-image-lowlatency 4.15.0.52.54 linux-image-lowlatency-hwe-18.04 4.18.0.22.72 linux-image-oem 4.15.0.1043.47 linux-image-oracle 4.15.0.1015.18 linux-image-raspi2 4.15.0.1038.36 linux-image-snapdragon 4.15.0.1055.58 linux-image-snapdragon-hwe-18.04 4.18.0.22.72 linux-image-virtual 4.15.0.52.54 linux-image-virtual-hwe-18.04 4.18.0.22.72 Ubuntu 16.04 LTS: linux-image-4.15.0-1015-oracle 4.15.0-1015.17~16.04.1 linux-image-4.15.0-1034-gcp 4.15.0-1034.36~16.04.1 linux-image-4.15.0-1041-aws 4.15.0-1041.43~16.04.1 linux-image-4.15.0-1047-azure 4.15.0-1047.51 linux-image-4.15.0-52-generic 4.15.0-52.56~16.04.1 linux-image-4.15.0-52-generic-lpae 4.15.0-52.56~16.04.1 linux-image-4.15.0-52-lowlatency 4.15.0-52.56~16.04.1 linux-image-4.4.0-1048-kvm 4.4.0-1048.55 linux-image-4.4.0-1085-aws 4.4.0-1085.96 linux-image-4.4.0-1111-raspi2 4.4.0-1111.120 linux-image-4.4.0-1115-snapdragon 4.4.0-1115.121 linux-image-4.4.0-151-generic 4.4.0-151.178 linux-image-4.4.0-151-generic-lpae 4.4.0-151.178 linux-image-4.4.0-151-lowlatency 4.4.0-151.178 linux-image-4.4.0-151-powerpc-e500mc 4.4.0-151.178 linux-image-4.4.0-151-powerpc-smp 4.4.0-151.178 linux-image-4.4.0-151-powerpc64-emb 4.4.0-151.178 linux-image-4.4.0-151-powerpc64-smp 4.4.0-151.178 linux-image-aws 4.4.0.1085.88 linux-image-aws-hwe 4.15.0.1041.41 linux-image-azure 4.15.0.1047.51 linux-image-gcp 4.15.0.1034.48 linux-image-generic 4.4.0.151.159 linux-image-generic-hwe-16.04 4.15.0.52.73 linux-image-generic-lpae 4.4.0.151.159 linux-image-generic-lpae-hwe-16.04 4.15.0.52.73 linux-image-gke 4.15.0.1034.48 linux-image-kvm 4.4.0.1048.48 linux-image-lowlatency 4.4.0.151.159 linux-image-lowlatency-hwe-16.04 4.15.0.52.73 linux-image-oem 4.15.0.52.73 linux-image-oracle 4.15.0.1015.9 linux-image-powerpc-e500mc 4.4.0.151.159 linux-image-powerpc-smp 4.4.0.151.159 linux-image-powerpc64-emb 4.4.0.151.159 linux-image-powerpc64-smp 4.4.0.151.159 linux-image-raspi2 4.4.0.1111.111 linux-image-snapdragon 4.4.0.1115.107 linux-image-virtual 4.4.0.151.159 linux-image-virtual-hwe-16.04 4.15.0.52.73 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. 8) - aarch64, noarch, ppc64le, s390x, x86_64 3. Bug Fix(es): * [HPE 8.0 Bug] nvme drive power button does not turn off drive (BZ#1700288) * RHEL8.0 - hw csum failure seen in dmesg and console (using mlx5/mlx4/Mellanox) (BZ#1700289) * RHEL8.0 - vfio-ap: add subsystem to matrix device to avoid libudev failures (kvm) (BZ#1700290) * [FJ8.1 Bug]: Make Fujitsu Erratum 010001 patch work on A64FX v1r0 (BZ#1700901) * [FJ8.0 Bug]: Fujitsu A64FX processor errata - panic by unknown fault (BZ#1700902) * RHEL 8.0 Snapshot 4 - nvme create-ns command hangs after creating 20 namespaces on Bolt (NVMe) (BZ#1701140) * [Cavium/Marvell 8.0 qed] Fix qed_mcp_halt() and qed_mcp_resume() (backporting bug) (BZ#1704184) * [Intel 8.1 Bug] PBF: Base frequency display fix (BZ#1706739) * [RHEL8]read/write operation not permitted to /sys/kernel/debug/gcov/reset (BZ#1708100) * RHEL8.0 - ISST-LTE:pVM:fleetwood:LPM:raylp85:After lpm seeing the console logs on the the lpar at target side (BZ#1708102) * RHEL8.0 - Backport support for software count cache flush Spectre v2 mitigation (BZ#1708112) * [Regression] RHEL8.0 - System crashed with one stress-ng-mremap stressor on Boston (kvm host) (BZ#1708617) * [intel ice Rhel 8 RC1] ethtool -A ethx causes interfaces to go down (BZ#1709433) 4. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The following packages have been upgraded to a later upstream version: redhat-release-virtualization-host (4.3.4), redhat-virtualization-host (4.3.4)

Trust: 1.71

sources: NVD: CVE-2019-11477 // VULHUB: VHN-143127 // VULMON: CVE-2019-11477 // PACKETSTORM: 153323 // PACKETSTORM: 153346 // PACKETSTORM: 154951 // PACKETSTORM: 153326 // PACKETSTORM: 153328 // PACKETSTORM: 153315 // PACKETSTORM: 153543

AFFECTED PRODUCTS

vendor:f5model:big-ip domain name systemscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:11.6.4

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:2.6.29

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:13.1.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:19.04

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.5

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:13.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:11.5.2

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.14.127

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:14.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.15

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:11.5.2

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:13.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:13.1.1

Trust: 1.0

vendor:pulsesecuremodel:pulse policy securescope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.5

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:13.1.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.10

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:14.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.9.182

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:8.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:15.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.20

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.1.11

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux ausscope:eqversion:6.5

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:15.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:eqversion:15.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.19.52

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:11.5.2

Trust: 1.0

vendor:redhatmodel:enterprise linux atomic hostscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:13.1.1

Trust: 1.0

vendor:redhatmodel:enterprise mrgscope:eqversion:2.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:14.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:11.6.4

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.4.182

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:lteversion:5.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:gteversion:5.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.16.69

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:12.1.4

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:5.0

Trust: 1.0

vendor:pulsesecuremodel:pulse secure virtual application delivery controllerscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:12.1.4

Trust: 1.0

vendor:ivantimodel:connect securescope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:eqversion:15.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:11.5.2

Trust: 1.0

vendor:redhatmodel:enterprise linux ausscope:eqversion:6.6

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:11.5.2

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.10

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:13.1.1

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.17

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:13.1.0

Trust: 1.0

sources: NVD: CVE-2019-11477

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-11477
value: HIGH

Trust: 1.0

security@ubuntu.com: CVE-2019-11477
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201906-681
value: HIGH

Trust: 0.6

VULHUB: VHN-143127
value: HIGH

Trust: 0.1

VULMON: CVE-2019-11477
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-11477
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-143127
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-11477
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

security@ubuntu.com: CVE-2019-11477
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-143127 // VULMON: CVE-2019-11477 // CNNVD: CNNVD-201906-681 // NVD: CVE-2019-11477 // NVD: CVE-2019-11477

PROBLEMTYPE DATA

problemtype:CWE-190

Trust: 1.1

sources: VULHUB: VHN-143127 // NVD: CVE-2019-11477

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 153346 // PACKETSTORM: 153328 // CNNVD: CNNVD-201906-681

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201906-681

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-143127

PATCH

title:Linux kernel Enter the fix for the verification error vulnerabilityurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=93875

Trust: 0.6

title:Red Hat: Important: redhat-virtualization-host security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191594 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191485 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191484 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191480 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-lts-trusty, linux-lts-xenial vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4017-2

Trust: 0.1

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191487 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4017-1

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191482 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191486 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191481 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191488 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191490 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191479 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191489 - Security Advisory

Trust: 0.1

title:Red Hat: Important: redhat-virtualization-host security and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191699 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191483 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2019-11477

Trust: 0.1

title:Amazon Linux AMI: ALAS-2019-1222url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2019-1222

Trust: 0.1

title:Arch Linux Advisories: [ASA-201906-12] linux-hardened: denial of serviceurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201906-12

Trust: 0.1

title:Amazon Linux 2: ALAS2-2019-1222url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2019-1222

Trust: 0.1

title:Arch Linux Advisories: [ASA-201906-15] linux-zen: denial of serviceurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201906-15

Trust: 0.1

title:Arch Linux Advisories: [ASA-201906-14] linux-lts: denial of serviceurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201906-14

Trust: 0.1

title:Arch Linux Advisories: [ASA-201906-13] linux: denial of serviceurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201906-13

Trust: 0.1

title:IBM: Security Bulletin: Multiple Vulnerabilities in the Linux kernel affect the IBM FlashSystem models 840 and 900url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=b0e404260719b6ae04a48fa01fe4ff1d

Trust: 0.1

title:IBM: Security Bulletin: Multiple Vulnerabilities in the Linux kernel affect the IBM FlashSystem models V840 and V9000url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=17e4e6718a6d3a42ddb3642e1aa88aaf

Trust: 0.1

title:Huawei Security Advisories: Security Advisory - Integer Overflow Vulnerability in the Linux Kernel (SACK Panic)url:https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories&qid=a0ea5bac8e90e20896758ffe948339eb

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM MQ Appliance is affected by kernel vulnerabilities (CVE-2019-11479, CVE-2019-11478 and CVE-2019-11477)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=3abb37d34c3aab5be030484842a197cf

Trust: 0.1

title:IBM: IBM Security Bulletin: Linux Kernel as used by IBM QRadar SIEM is vulnerable to Denial of Service(CVE-2019-11477, CVE-2019-11478, CVE-2019-11479)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=ac66c3446fcbed558afc45a4f11875b9

Trust: 0.1

title:IBM: IBM Security Bulletin: Linux Kernel as used in IBM QRadar Network Packet Capture is vulnerable to denial of service (CVE-2019-11477, CVE-2019-11478, CVE-2019-11479)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=d4c7bbb6295709432116ceed6c8665d0

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM QRadar Network Security is affected by Linux kernel vulnerabilities (CVE-2019-11479, CVE-2019-11478, CVE-2019-11477)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=bae5fea992c13f587f4c457e2320189d

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM Cloud Kubernetes Service is affected by Linux Kernel security vulnerabilities (CVE-2019-11477, CVE-2019-11478, CVE-2019-11479)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=c19eb1501fe75f4801786c3ecf1bdfcd

Trust: 0.1

title:IBM: IBM Security Bulletin: Vulnerabilities in kernel affect Power Hardware Management Console (CVE-2019-11479,CVE-2019-11477 and CVE-2019-11478)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=1eb240b9222a3f8a10e0a63fa47e7f24

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM Security QRadar Packet Capture is vulnerable to Denial of Service (CVE-2019-11477, CVE-2019-11478, CVE-2019-11479, CVE-2019-3896)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=1282c74cfb8f7d86371051c0a3c9e604

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=b013e0ae6345849ef39c81d52c9d45cf

Trust: 0.1

title:Citrix Security Bulletins: Citrix SD-WAN Security Updateurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=fa8566afabfba193549f3f15c0c81ff5

Trust: 0.1

title:Debian CVElist Bug Report Logs: linux-image-4.19.0-4-amd64: CVE-2019-11815url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=877a1ae1b4d7402bac3b3a0c44e3253b

Trust: 0.1

title:IBM: Security Bulletin: Vulnerabilities have been identified in OpenSSL and the Kernel shipped with the DS8000 Hardware Management Console (HMC)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=423d1da688755122eb2591196e4cc160

Trust: 0.1

title:Debian Security Advisories: DSA-4465-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=1a396329c4647adcc53e47cd56d6ddad

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - July 2019url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=767e8ff3a913d6c9b177c63c24420933

Trust: 0.1

title:Fortinet Security Advisories: TCP SACK panic attack- Linux Kernel Vulnerabilities- CVE-2019-11477, CVE-2019-11478 & CVE-2019-11479url:https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories&qid=FG-IR-19-180

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM Netezza Host Management is affected by the vulnerabilities known as Intel Microarchitectural Data Sampling (MDS) and other Kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=9b0697bf711f12539432f3ec83b074bf

Trust: 0.1

title:IBM: Security Bulletin: Multiple vulnerabilities affect IBM Cloud Object Storage Systems (February 2020v2)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=d9474066c07efdb84c4612586270078f

Trust: 0.1

title:IBM: IBM Security Bulletin: Linux Kernel vulnerabilities affect IBM Spectrum Protect Plus CVE-2019-10140, CVE-2019-11477, CVE-2019-11478, CVE-2019-11479, CVE-2019-13233, CVE-2019-13272, CVE-2019-14283, CVE-2019-14284, CVE-2019-15090, CVE-2019-15807, CVE-2019-15925url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=d9cd8f6d11c68af77f2f2bd27ca37bed

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple Security Vulnerabilities have been addressed in IBM Security Access Manager Applianceurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=800337bc69aa7ad92ac88a2adcc7d426

Trust: 0.1

title:Palo Alto Networks Security Advisory: url:https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory&qid=e4153a9b76a5eea42e73bc20e968375b

Trust: 0.1

title:Palo Alto Networks Security Advisory: PAN-SA-2019-0013 Information about TCP SACK Panic Findings in PAN-OSurl:https://vulmon.com/vendoradvisory?qidtp=palo_alto_networks_security_advisory&qid=57ed3d9f467472d630cb7b7dfca89570

Trust: 0.1

title:IBM: IBM Security Bulletin: Vyatta 5600 vRouter Software Patches – Release 1801-zaurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=8710e4e233940f7482a6adad4643a7a8

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM Security Privileged Identity Manager is affected by multiple security vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=8580d3cd770371e2ef0f68ca624b80b0

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d

Trust: 0.1

title:linux_hardening_arsenalurl:https://github.com/lucassbeiler/linux_hardening_arsenal

Trust: 0.1

title:tcp_sack_fixurl:https://github.com/sonoransun/tcp_sack_fix

Trust: 0.1

title:kpatch-sack-panicurl:https://github.com/fengjian/kpatch-sack-panic

Trust: 0.1

title:FFFFMurl:https://github.com/misanthropos/FFFFM

Trust: 0.1

title:docLinuxurl:https://github.com/hightemp/docLinux

Trust: 0.1

sources: VULMON: CVE-2019-11477 // CNNVD: CNNVD-201906-681

EXTERNAL IDS

db:NVDid:CVE-2019-11477

Trust: 2.5

db:PACKETSTORMid:153346

Trust: 1.8

db:PACKETSTORMid:154951

Trust: 1.8

db:OPENWALLid:OSS-SECURITY/2019/10/29/3

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2019/10/24/1

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2019/07/06/4

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2019/07/06/3

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2019/06/28/2

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2019/06/20/3

Trust: 1.7

db:ICS CERTid:ICSA-19-253-03

Trust: 1.7

db:PULSESECUREid:SA44193

Trust: 1.7

db:SIEMENSid:SSA-462066

Trust: 1.7

db:MCAFEEid:SB10287

Trust: 1.7

db:CERT/CCid:VU#905115

Trust: 1.7

db:PACKETSTORMid:153329

Trust: 0.7

db:CNNVDid:CNNVD-201906-681

Trust: 0.7

db:BIDid:108801

Trust: 0.7

db:AUSCERTid:ESB-2019.2171

Trust: 0.6

db:AUSCERTid:ESB-2020.3564

Trust: 0.6

db:AUSCERTid:ESB-2019.2155

Trust: 0.6

db:AUSCERTid:ESB-2019.2231

Trust: 0.6

db:AUSCERTid:ESB-2019.4528

Trust: 0.6

db:AUSCERTid:ESB-2019.4316

Trust: 0.6

db:AUSCERTid:ESB-2019.4252

Trust: 0.6

db:AUSCERTid:ESB-2020.4255

Trust: 0.6

db:AUSCERTid:ESB-2020.0736

Trust: 0.6

db:AUSCERTid:ESB-2020.0342

Trust: 0.6

db:AUSCERTid:ASB-2019.0178.3

Trust: 0.6

db:LENOVOid:LEN-29592

Trust: 0.6

db:PACKETSTORMid:153315

Trust: 0.2

db:PACKETSTORMid:153323

Trust: 0.2

db:PACKETSTORMid:153328

Trust: 0.2

db:PACKETSTORMid:153424

Trust: 0.1

db:PACKETSTORMid:153324

Trust: 0.1

db:PACKETSTORMid:153320

Trust: 0.1

db:PACKETSTORMid:153316

Trust: 0.1

db:PACKETSTORMid:153327

Trust: 0.1

db:PACKETSTORMid:153317

Trust: 0.1

db:PACKETSTORMid:153321

Trust: 0.1

db:PACKETSTORMid:153318

Trust: 0.1

db:PACKETSTORMid:153430

Trust: 0.1

db:PACKETSTORMid:153325

Trust: 0.1

db:PACKETSTORMid:153322

Trust: 0.1

db:VULHUBid:VHN-143127

Trust: 0.1

db:VULMONid:CVE-2019-11477

Trust: 0.1

db:PACKETSTORMid:153326

Trust: 0.1

db:PACKETSTORMid:153543

Trust: 0.1

sources: VULHUB: VHN-143127 // VULMON: CVE-2019-11477 // PACKETSTORM: 153323 // PACKETSTORM: 153346 // PACKETSTORM: 154951 // PACKETSTORM: 153326 // PACKETSTORM: 153328 // PACKETSTORM: 153315 // PACKETSTORM: 153543 // CNNVD: CNNVD-201906-681 // NVD: CVE-2019-11477

REFERENCES

url:http://packetstormsecurity.com/files/153346/kernel-live-patch-security-notice-lsn-0052-1.html

Trust: 2.3

url:https://www.oracle.com/security-alerts/cpuoct2020.html

Trust: 2.3

url:https://www.us-cert.gov/ics/advisories/icsa-19-253-03

Trust: 2.3

url:https://access.redhat.com/security/vulnerabilities/tcpsack

Trust: 2.1

url:https://wiki.ubuntu.com/securityteam/knowledgebase/sackpanic

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2019:1699

Trust: 1.8

url:https://www.kb.cert.org/vuls/id/905115

Trust: 1.7

url:http://www.arubanetworks.com/assets/alert/aruba-psa-2020-010.txt

Trust: 1.7

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en

Trust: 1.7

url:http://www.vmware.com/security/advisories/vmsa-2019-0010.html

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf

Trust: 1.7

url:https://kb.pulsesecure.net/articles/pulse_security_advisories/sa44193

Trust: 1.7

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2019-0006

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20190625-0001/

Trust: 1.7

url:https://support.f5.com/csp/article/k78234183

Trust: 1.7

url:https://www.synology.com/security/advisory/synology_sa_19_28

Trust: 1.7

url:http://packetstormsecurity.com/files/154951/kernel-live-patch-security-notice-lsn-0058-1.html

Trust: 1.7

url:https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff

Trust: 1.7

url:https://github.com/netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md

Trust: 1.7

url:https://www.oracle.com/security-alerts/cpujan2020.html

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2019/06/20/3

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2019/06/28/2

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2019/07/06/3

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2019/07/06/4

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2019/10/24/1

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2019/10/29/3

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2019:1594

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2019:1602

Trust: 1.7

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10287

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-11477

Trust: 1.3

url:https://access.redhat.com/security/cve/cve-2019-11477

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2019-11478

Trust: 0.7

url:https://access.redhat.com/errata/rhsa-2019:1484

Trust: 0.7

url:https://access.redhat.com/errata/rhsa-2019:1487

Trust: 0.7

url:https://usn.ubuntu.com/4017-1

Trust: 0.7

url:https://access.redhat.com/errata/rhsa-2019:1479

Trust: 0.7

url:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20191204-01-kernel-cn

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2019:1490

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2019:1489

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2019:1488

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2019:1486

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2019:1485

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2019:1483

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2019:1482

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2019:1481

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2019:1480

Trust: 0.6

url:https://bugzilla.redhat.com/show_bug.cgi?id=1719123

Trust: 0.6

url:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=832d11c5cd076abc0aa1eaf7be96c81d1a59ce41

Trust: 0.6

url:http://www.kernel.org/

Trust: 0.6

url:https://usn.ubuntu.com/4017-2

Trust: 0.6

url:https://support.citrix.com/article/ctx256725

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191530-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191529-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191532-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191536-1.html

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1284766

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1284760

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1284772

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1284778

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1284784

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191550-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191535-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191534-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191533-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191527-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-201914089-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20192952-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20192951-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20192950-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191581-1.html

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191588-1.html

Trust: 0.6

url:https://fortiguard.com/psirt/fg-ir-19-180

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-api-connect-v5-is-impacted-by-a-denial-of-service-vulnerability-in-linux-kernel-cve-2019-11477/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4528/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4316/

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1171528

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20191225-01-kernel-cn

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0736/

Trust: 0.6

url:https://packetstormsecurity.com/files/153329/linux-freebsd-tcp-based-denial-of-service.html

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1137796

Trust: 0.6

url:https://www.oracle.com/security-alerts/cpujan2020verbose.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2155/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4252/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0342/

Trust: 0.6

url:https://www.ibm.com/support/pages/node/3517185

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-19-253-03

Trust: 0.6

url:https://vigilance.fr/vulnerability/linux-kernel-denial-of-service-via-tcp-sack-low-mss-panic-29543

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-have-been-identified-in-openssl-and-the-kernel-shipped-with-the-ds8000-hardware-management-console-hmc/

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-29592

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.4255/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2231/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2171/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/asb-2019.0178.3/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-has-announced-a-release-for-ibm-security-identity-governance-and-intelligence-in-response-to-security-vulnerability-cve-2019-11479-cve-2019-11478-cve-2019-11477/

Trust: 0.6

url:https://www.securityfocus.com/bid/108801

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-integrated-management-module-ii-imm2-is-affected-by-vulnerabilities-in-tcp-cve-2019-11477-cve-2019-11478-cve-2019-11479/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3564/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-bootable-media-creator-bomc-is-affected-by-vulnerabilities-in-the-kernel/

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2019-11479

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/security/team/key/

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-11479

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2019-11478

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

Trust: 0.2

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10287

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14815

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20856

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-2181

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10207

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14821

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14835

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3846

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-10905

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14816

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-12614

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-21008

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10126

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14284

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14283

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11833

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-2054

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20976

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-0136

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14814

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20961

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-7566

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000004

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000004

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-7566

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.18.0-1014.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.18.0-1018.20

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.0.0-1008.8

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1041.43~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1048.55

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1115.121

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1034.36~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1043.48

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-52.56

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.18.0-1013.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1055.59

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1111.120

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1015.17

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/5.0.0-1014.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.18.0-1020.20

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1038.40

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-52.56~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1036.36

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.18.0-1020.20~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/5.0.0-1010.10

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.4.0-151.178

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.18.0-22.23

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.0.0-1008.8

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1034.36

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.0.0-17.18

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1041.43

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.18.0-1016.18

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1085.96

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1047.51

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.0.0-1008.8

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/4.18.0-22.23~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1015.17~16.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-9213

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-9213

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10167

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10166

Trust: 0.1

url:https://access.redhat.com/articles/2974891

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10166

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10168

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10161

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10168

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10161

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10167

Trust: 0.1

sources: VULHUB: VHN-143127 // PACKETSTORM: 153323 // PACKETSTORM: 153346 // PACKETSTORM: 154951 // PACKETSTORM: 153326 // PACKETSTORM: 153328 // PACKETSTORM: 153315 // PACKETSTORM: 153543 // CNNVD: CNNVD-201906-681 // NVD: CVE-2019-11477

CREDITS

Jonathan Looney (Netflix Information Security), This vulnerability is caused by Netflix Researcher Jonathan Looney Find .,Jonathan Looney

Trust: 0.6

sources: CNNVD: CNNVD-201906-681

SOURCES

db:VULHUBid:VHN-143127
db:VULMONid:CVE-2019-11477
db:PACKETSTORMid:153323
db:PACKETSTORMid:153346
db:PACKETSTORMid:154951
db:PACKETSTORMid:153326
db:PACKETSTORMid:153328
db:PACKETSTORMid:153315
db:PACKETSTORMid:153543
db:CNNVDid:CNNVD-201906-681
db:NVDid:CVE-2019-11477

LAST UPDATE DATE

2025-12-22T21:25:41.145000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-143127date:2023-01-17T00:00:00
db:VULMONid:CVE-2019-11477date:2023-08-16T00:00:00
db:CNNVDid:CNNVD-201906-681date:2023-01-18T00:00:00
db:NVDid:CVE-2019-11477date:2024-11-21T04:21:09.480

SOURCES RELEASE DATE

db:VULHUBid:VHN-143127date:2019-06-19T00:00:00
db:VULMONid:CVE-2019-11477date:2019-06-19T00:00:00
db:PACKETSTORMid:153323date:2019-06-18T15:43:40
db:PACKETSTORMid:153346date:2019-06-19T17:20:41
db:PACKETSTORMid:154951date:2019-10-23T18:32:10
db:PACKETSTORMid:153326date:2019-06-18T15:44:04
db:PACKETSTORMid:153328date:2019-06-18T15:44:18
db:PACKETSTORMid:153315date:2019-06-17T19:15:58
db:PACKETSTORMid:153543date:2019-07-08T14:38:09
db:CNNVDid:CNNVD-201906-681date:2019-06-18T00:00:00
db:NVDid:CVE-2019-11477date:2019-06-19T00:15:12.640