ID

VAR-201906-1175


CVE

CVE-2019-11477


TITLE

Multiple TCP Selective Acknowledgement (SACK) and Maximum Segment Size (MSS) networking vulnerabilities may cause denial-of-service conditions in Linux and FreeBSD kernels

Trust: 0.8

sources: CERT/CC: VU#905115

DESCRIPTION

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff. Multiple TCP Selective Acknowledgement (SACK) and Maximum Segment Size (MSS) networking vulnerabilities may cause denial-of-service conditions in Linux and FreeBSD kernels. ========================================================================= Ubuntu Security Notice USN-4017-1 June 17, 2019 linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 19.04 - Ubuntu 18.10 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: The system could be made to crash if it received specially crafted network traffic. (CVE-2019-11477) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 19.04: linux-image-5.0.0-1008-aws 5.0.0-1008.8 linux-image-5.0.0-1008-gcp 5.0.0-1008.8 linux-image-5.0.0-1008-kvm 5.0.0-1008.8 linux-image-5.0.0-1010-raspi2 5.0.0-1010.10 linux-image-5.0.0-1014-snapdragon 5.0.0-1014.14 linux-image-5.0.0-17-generic 5.0.0-17.18 linux-image-5.0.0-17-generic-lpae 5.0.0-17.18 linux-image-5.0.0-17-lowlatency 5.0.0-17.18 linux-image-aws 5.0.0.1008.8 linux-image-gcp 5.0.0.1008.8 linux-image-generic 5.0.0.17.18 linux-image-generic-lpae 5.0.0.17.18 linux-image-gke 5.0.0.1008.8 linux-image-kvm 5.0.0.1008.8 linux-image-lowlatency 5.0.0.17.18 linux-image-raspi2 5.0.0.1010.7 linux-image-snapdragon 5.0.0.1014.7 linux-image-virtual 5.0.0.17.18 Ubuntu 18.10: linux-image-4.18.0-1013-gcp 4.18.0-1013.14 linux-image-4.18.0-1014-kvm 4.18.0-1014.14 linux-image-4.18.0-1016-raspi2 4.18.0-1016.18 linux-image-4.18.0-1018-aws 4.18.0-1018.20 linux-image-4.18.0-1020-azure 4.18.0-1020.20 linux-image-4.18.0-22-generic 4.18.0-22.23 linux-image-4.18.0-22-generic-lpae 4.18.0-22.23 linux-image-4.18.0-22-lowlatency 4.18.0-22.23 linux-image-4.18.0-22-snapdragon 4.18.0-22.23 linux-image-aws 4.18.0.1018.18 linux-image-azure 4.18.0.1020.21 linux-image-gcp 4.18.0.1013.13 linux-image-generic 4.18.0.22.23 linux-image-generic-lpae 4.18.0.22.23 linux-image-gke 4.18.0.1013.13 linux-image-kvm 4.18.0.1014.14 linux-image-lowlatency 4.18.0.22.23 linux-image-raspi2 4.18.0.1016.13 linux-image-snapdragon 4.18.0.22.23 linux-image-virtual 4.18.0.22.23 Ubuntu 18.04 LTS: linux-image-4.15.0-1015-oracle 4.15.0-1015.17 linux-image-4.15.0-1034-gcp 4.15.0-1034.36 linux-image-4.15.0-1036-kvm 4.15.0-1036.36 linux-image-4.15.0-1038-raspi2 4.15.0-1038.40 linux-image-4.15.0-1041-aws 4.15.0-1041.43 linux-image-4.15.0-1043-oem 4.15.0-1043.48 linux-image-4.15.0-1055-snapdragon 4.15.0-1055.59 linux-image-4.15.0-52-generic 4.15.0-52.56 linux-image-4.15.0-52-generic-lpae 4.15.0-52.56 linux-image-4.15.0-52-lowlatency 4.15.0-52.56 linux-image-4.18.0-1020-azure 4.18.0-1020.20~18.04.1 linux-image-4.18.0-22-generic 4.18.0-22.23~18.04.1 linux-image-4.18.0-22-generic-lpae 4.18.0-22.23~18.04.1 linux-image-4.18.0-22-lowlatency 4.18.0-22.23~18.04.1 linux-image-4.18.0-22-snapdragon 4.18.0-22.23~18.04.1 linux-image-aws 4.15.0.1041.40 linux-image-azure 4.18.0.1020.19 linux-image-gcp 4.15.0.1034.36 linux-image-generic 4.15.0.52.54 linux-image-generic-hwe-18.04 4.18.0.22.72 linux-image-generic-lpae 4.15.0.52.54 linux-image-generic-lpae-hwe-18.04 4.18.0.22.72 linux-image-kvm 4.15.0.1036.36 linux-image-lowlatency 4.15.0.52.54 linux-image-lowlatency-hwe-18.04 4.18.0.22.72 linux-image-oem 4.15.0.1043.47 linux-image-oracle 4.15.0.1015.18 linux-image-raspi2 4.15.0.1038.36 linux-image-snapdragon 4.15.0.1055.58 linux-image-snapdragon-hwe-18.04 4.18.0.22.72 linux-image-virtual 4.15.0.52.54 linux-image-virtual-hwe-18.04 4.18.0.22.72 Ubuntu 16.04 LTS: linux-image-4.15.0-1015-oracle 4.15.0-1015.17~16.04.1 linux-image-4.15.0-1034-gcp 4.15.0-1034.36~16.04.1 linux-image-4.15.0-1041-aws 4.15.0-1041.43~16.04.1 linux-image-4.15.0-1047-azure 4.15.0-1047.51 linux-image-4.15.0-52-generic 4.15.0-52.56~16.04.1 linux-image-4.15.0-52-generic-lpae 4.15.0-52.56~16.04.1 linux-image-4.15.0-52-lowlatency 4.15.0-52.56~16.04.1 linux-image-4.4.0-1048-kvm 4.4.0-1048.55 linux-image-4.4.0-1085-aws 4.4.0-1085.96 linux-image-4.4.0-1111-raspi2 4.4.0-1111.120 linux-image-4.4.0-1115-snapdragon 4.4.0-1115.121 linux-image-4.4.0-151-generic 4.4.0-151.178 linux-image-4.4.0-151-generic-lpae 4.4.0-151.178 linux-image-4.4.0-151-lowlatency 4.4.0-151.178 linux-image-4.4.0-151-powerpc-e500mc 4.4.0-151.178 linux-image-4.4.0-151-powerpc-smp 4.4.0-151.178 linux-image-4.4.0-151-powerpc64-emb 4.4.0-151.178 linux-image-4.4.0-151-powerpc64-smp 4.4.0-151.178 linux-image-aws 4.4.0.1085.88 linux-image-aws-hwe 4.15.0.1041.41 linux-image-azure 4.15.0.1047.51 linux-image-gcp 4.15.0.1034.48 linux-image-generic 4.4.0.151.159 linux-image-generic-hwe-16.04 4.15.0.52.73 linux-image-generic-lpae 4.4.0.151.159 linux-image-generic-lpae-hwe-16.04 4.15.0.52.73 linux-image-gke 4.15.0.1034.48 linux-image-kvm 4.4.0.1048.48 linux-image-lowlatency 4.4.0.151.159 linux-image-lowlatency-hwe-16.04 4.15.0.52.73 linux-image-oem 4.15.0.52.73 linux-image-oracle 4.15.0.1015.9 linux-image-powerpc-e500mc 4.4.0.151.159 linux-image-powerpc-smp 4.4.0.151.159 linux-image-powerpc64-emb 4.4.0.151.159 linux-image-powerpc64-smp 4.4.0.151.159 linux-image-raspi2 4.4.0.1111.111 linux-image-snapdragon 4.4.0.1115.107 linux-image-virtual 4.4.0.151.159 linux-image-virtual-hwe-16.04 4.15.0.52.73 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The following packages have been upgraded to a later upstream version: redhat-release-virtualization-host (4.3.4), redhat-virtualization-host (4.3.4). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2019:1482-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:1482 Issue date: 2019-06-17 CVE Names: CVE-2019-11477 CVE-2019-11478 CVE-2019-11479 ==================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.5 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.5) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.5) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.5) - ppc64, ppc64le, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477) * Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478) * Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1719123 - CVE-2019-11477 Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service 1719128 - CVE-2019-11478 Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service 1719129 - CVE-2019-11479 Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.5): Source: kernel-3.10.0-862.34.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-862.34.2.el7.noarch.rpm kernel-doc-3.10.0-862.34.2.el7.noarch.rpm x86_64: kernel-3.10.0-862.34.2.el7.x86_64.rpm kernel-debug-3.10.0-862.34.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.34.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.34.2.el7.x86_64.rpm kernel-devel-3.10.0-862.34.2.el7.x86_64.rpm kernel-headers-3.10.0-862.34.2.el7.x86_64.rpm kernel-tools-3.10.0-862.34.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.34.2.el7.x86_64.rpm perf-3.10.0-862.34.2.el7.x86_64.rpm perf-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm python-perf-3.10.0-862.34.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5): x86_64: kernel-debug-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.34.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.34.2.el7.x86_64.rpm perf-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.5): Source: kernel-3.10.0-862.34.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-862.34.2.el7.noarch.rpm kernel-doc-3.10.0-862.34.2.el7.noarch.rpm ppc64: kernel-3.10.0-862.34.2.el7.ppc64.rpm kernel-bootwrapper-3.10.0-862.34.2.el7.ppc64.rpm kernel-debug-3.10.0-862.34.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-862.34.2.el7.ppc64.rpm kernel-debug-devel-3.10.0-862.34.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-862.34.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-862.34.2.el7.ppc64.rpm kernel-devel-3.10.0-862.34.2.el7.ppc64.rpm kernel-headers-3.10.0-862.34.2.el7.ppc64.rpm kernel-tools-3.10.0-862.34.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-862.34.2.el7.ppc64.rpm kernel-tools-libs-3.10.0-862.34.2.el7.ppc64.rpm perf-3.10.0-862.34.2.el7.ppc64.rpm perf-debuginfo-3.10.0-862.34.2.el7.ppc64.rpm python-perf-3.10.0-862.34.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-862.34.2.el7.ppc64.rpm ppc64le: kernel-3.10.0-862.34.2.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-862.34.2.el7.ppc64le.rpm kernel-debug-3.10.0-862.34.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-862.34.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-862.34.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-862.34.2.el7.ppc64le.rpm kernel-devel-3.10.0-862.34.2.el7.ppc64le.rpm kernel-headers-3.10.0-862.34.2.el7.ppc64le.rpm kernel-tools-3.10.0-862.34.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-862.34.2.el7.ppc64le.rpm kernel-tools-libs-3.10.0-862.34.2.el7.ppc64le.rpm perf-3.10.0-862.34.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-862.34.2.el7.ppc64le.rpm python-perf-3.10.0-862.34.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-862.34.2.el7.ppc64le.rpm s390x: kernel-3.10.0-862.34.2.el7.s390x.rpm kernel-debug-3.10.0-862.34.2.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-862.34.2.el7.s390x.rpm kernel-debug-devel-3.10.0-862.34.2.el7.s390x.rpm kernel-debuginfo-3.10.0-862.34.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-862.34.2.el7.s390x.rpm kernel-devel-3.10.0-862.34.2.el7.s390x.rpm kernel-headers-3.10.0-862.34.2.el7.s390x.rpm kernel-kdump-3.10.0-862.34.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-862.34.2.el7.s390x.rpm kernel-kdump-devel-3.10.0-862.34.2.el7.s390x.rpm perf-3.10.0-862.34.2.el7.s390x.rpm perf-debuginfo-3.10.0-862.34.2.el7.s390x.rpm python-perf-3.10.0-862.34.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-862.34.2.el7.s390x.rpm x86_64: kernel-3.10.0-862.34.2.el7.x86_64.rpm kernel-debug-3.10.0-862.34.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.34.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.34.2.el7.x86_64.rpm kernel-devel-3.10.0-862.34.2.el7.x86_64.rpm kernel-headers-3.10.0-862.34.2.el7.x86_64.rpm kernel-tools-3.10.0-862.34.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.34.2.el7.x86_64.rpm perf-3.10.0-862.34.2.el7.x86_64.rpm perf-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm python-perf-3.10.0-862.34.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.5): ppc64: kernel-debug-debuginfo-3.10.0-862.34.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-862.34.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-862.34.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-862.34.2.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-862.34.2.el7.ppc64.rpm perf-debuginfo-3.10.0-862.34.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-862.34.2.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-862.34.2.el7.ppc64le.rpm kernel-debug-devel-3.10.0-862.34.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-862.34.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-862.34.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-862.34.2.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-862.34.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-862.34.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-862.34.2.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.34.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.34.2.el7.x86_64.rpm perf-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.34.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-11477 https://access.redhat.com/security/cve/CVE-2019-11478 https://access.redhat.com/security/cve/CVE-2019-11479 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/tcpsack 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXQfk3NzjgjWX9erEAQiytA/+LYuWZPA+XAzTGUtoSanvsTMhe3fdVmEs uC08ljrlPeR/Wd6nDM6/kA31tXy0DuL23ocXTXoz+eBQNzpv7wAV3BNegLB+EbaF lalFLRhneQHOPqVQm8NRM/+aQoUSPZGroINcBCxC+RRDCnzgd1IYYOPJeq3N3che 3/o1whqn8af/uYrE49Lg+qimRFPIDkUg/r+pTv8M/cWdskrDlv3ir8Dn3rczrg9C /MjRxlqayPLN60RsdQO1MJPIq/5/4avHbmlqYGvzWyqdMYZckJWtJbRcCNg4MaII P8sx7pW1h6MdC23tGdqdk1VsgPl5ap1qYDjIJdHkp2wOeih6Lk1ezBViRuOfWpx1 Wy2EpmGRy8IUA/biIHedki48cfBHE2T3Bd7dE0V1HHWP5c9iZIov5OTG6dvy5OMV bQA5+BVrSdrOPKj6VDwrbcDWoeSR8O0eMghoj7o3aP6cPzAMmQ2xxj8G4hrZuP0P 1eVZrMPgE+N6Brd9k/o70Gw90Q7N2o8ONJFrz+gFdIGxI+m3dNGhne5hwxou1Q+k 5/O4S3Eu2afic3WNh6K3Zbk8K5rzfqFGdOFEGYw0/lZblRgr9scVQdfo4ohoxabf ojkr1xsbNIcSxHYBm9LRM4cMXblFr+yx+mYZsCA539F2DKID42Y89msdcjGhOUEL SkhJ47gvUQ4=+jJe -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 7) - aarch64, noarch, ppc64le 3

Trust: 2.07

sources: NVD: CVE-2019-11477 // CERT/CC: VU#905115 // VULHUB: VHN-143127 // PACKETSTORM: 153328 // PACKETSTORM: 153543 // PACKETSTORM: 153318 // PACKETSTORM: 153430

AFFECTED PRODUCTS

vendor:f5model:big-ip domain name systemscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:11.6.4

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:2.6.29

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:13.1.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:19.04

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.5

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:13.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:11.5.2

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.14.127

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:14.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.15

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:11.5.2

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:13.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:13.1.1

Trust: 1.0

vendor:pulsesecuremodel:pulse policy securescope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:7.5

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:13.1.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.10

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:14.1.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.9.182

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:8.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:15.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.20

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.1.11

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux ausscope:eqversion:6.5

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:15.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:6.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:eqversion:15.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.19.52

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:11.5.2

Trust: 1.0

vendor:redhatmodel:enterprise linux atomic hostscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:lteversion:13.1.1

Trust: 1.0

vendor:redhatmodel:enterprise mrgscope:eqversion:2.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:14.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:11.6.4

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.4.182

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:lteversion:5.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.0.0

Trust: 1.0

vendor:f5model:traffix signaling delivery controllerscope:gteversion:5.0.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.16.69

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip webacceleratorscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:12.1.4

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:5.0

Trust: 1.0

vendor:pulsesecuremodel:pulse secure virtual application delivery controllerscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:12.1.4

Trust: 1.0

vendor:ivantimodel:connect securescope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:12.1.0

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:11.6.4

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip edge gatewayscope:eqversion:15.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:12.1.4

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:11.5.2

Trust: 1.0

vendor:redhatmodel:enterprise linux ausscope:eqversion:6.6

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:11.5.2

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.10

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:13.1.1

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.17

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:13.1.1

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:15.0.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:13.1.0

Trust: 1.0

vendor:arch linuxmodel: - scope: - version: -

Trust: 0.8

vendor:aristamodel: - scope: - version: -

Trust: 0.8

vendor:check pointmodel: - scope: - version: -

Trust: 0.8

vendor:coreosmodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:synologymodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

sources: CERT/CC: VU#905115 // NVD: CVE-2019-11477

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-11477
value: HIGH

Trust: 1.0

security@ubuntu.com: CVE-2019-11477
value: HIGH

Trust: 1.0

VULHUB: VHN-143127
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-11477
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-143127
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-11477
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

security@ubuntu.com: CVE-2019-11477
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-143127 // NVD: CVE-2019-11477 // NVD: CVE-2019-11477

PROBLEMTYPE DATA

problemtype:CWE-190

Trust: 1.1

sources: VULHUB: VHN-143127 // NVD: CVE-2019-11477

THREAT TYPE

remote

Trust: 0.1

sources: PACKETSTORM: 153328

TYPE

overflow

Trust: 0.1

sources: PACKETSTORM: 153328

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-143127

EXTERNAL IDS

db:NVDid:CVE-2019-11477

Trust: 2.3

db:CERT/CCid:VU#905115

Trust: 1.9

db:PACKETSTORMid:153346

Trust: 1.1

db:PACKETSTORMid:154951

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2019/10/29/3

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2019/10/24/1

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2019/07/06/4

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2019/07/06/3

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2019/06/28/2

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2019/06/20/3

Trust: 1.1

db:ICS CERTid:ICSA-19-253-03

Trust: 1.1

db:PULSESECUREid:SA44193

Trust: 1.1

db:SIEMENSid:SSA-462066

Trust: 1.1

db:MCAFEEid:SB10287

Trust: 1.1

db:PACKETSTORMid:153318

Trust: 0.2

db:PACKETSTORMid:153430

Trust: 0.2

db:PACKETSTORMid:153328

Trust: 0.2

db:PACKETSTORMid:153424

Trust: 0.1

db:PACKETSTORMid:153324

Trust: 0.1

db:PACKETSTORMid:153329

Trust: 0.1

db:PACKETSTORMid:153320

Trust: 0.1

db:PACKETSTORMid:153316

Trust: 0.1

db:PACKETSTORMid:153327

Trust: 0.1

db:PACKETSTORMid:153317

Trust: 0.1

db:PACKETSTORMid:153321

Trust: 0.1

db:PACKETSTORMid:153315

Trust: 0.1

db:PACKETSTORMid:153323

Trust: 0.1

db:PACKETSTORMid:153325

Trust: 0.1

db:PACKETSTORMid:153322

Trust: 0.1

db:CNNVDid:CNNVD-201906-681

Trust: 0.1

db:BIDid:108801

Trust: 0.1

db:VULHUBid:VHN-143127

Trust: 0.1

db:PACKETSTORMid:153543

Trust: 0.1

sources: CERT/CC: VU#905115 // VULHUB: VHN-143127 // PACKETSTORM: 153328 // PACKETSTORM: 153543 // PACKETSTORM: 153318 // PACKETSTORM: 153430 // NVD: CVE-2019-11477

REFERENCES

url:https://access.redhat.com/security/vulnerabilities/tcpsack

Trust: 3.0

url:https://github.com/netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md

Trust: 1.9

url:https://www.synology.com/security/advisory/synology_sa_19_28

Trust: 1.9

url:https://wiki.ubuntu.com/securityteam/knowledgebase/sackpanic

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2019:1602

Trust: 1.2

url:https://access.redhat.com/errata/rhsa-2019:1699

Trust: 1.2

url:https://www.kb.cert.org/vuls/id/905115

Trust: 1.1

url:http://www.arubanetworks.com/assets/alert/aruba-psa-2020-010.txt

Trust: 1.1

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en

Trust: 1.1

url:http://www.vmware.com/security/advisories/vmsa-2019-0010.html

Trust: 1.1

url:https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf

Trust: 1.1

url:https://kb.pulsesecure.net/articles/pulse_security_advisories/sa44193

Trust: 1.1

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2019-0006

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20190625-0001/

Trust: 1.1

url:https://support.f5.com/csp/article/k78234183

Trust: 1.1

url:http://packetstormsecurity.com/files/153346/kernel-live-patch-security-notice-lsn-0052-1.html

Trust: 1.1

url:http://packetstormsecurity.com/files/154951/kernel-live-patch-security-notice-lsn-0058-1.html

Trust: 1.1

url:https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpujan2020.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuoct2020.html

Trust: 1.1

url:https://www.us-cert.gov/ics/advisories/icsa-19-253-03

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2019/06/20/3

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2019/06/28/2

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2019/07/06/3

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2019/07/06/4

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2019/10/24/1

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2019/10/29/3

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2019:1594

Trust: 1.1

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10287

Trust: 1.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11477

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11478

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11479

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5599

Trust: 0.8

url:https://security.archlinux.org/cve-2019-11477https://security.archlinux.org/cve-2019-11478https://security.archlinux.org/cve-2019-11479

Trust: 0.8

url:https://www.arista.com/en/support/advisories-notices/security-advisories/8066-security-advisory-41

Trust: 0.8

url:https://coreos.com/releases/

Trust: 0.8

url:https://security-tracker.debian.org/tracker/cve-2019-11477https://security-tracker.debian.org/tracker/cve-2019-11478https://security-tracker.debian.org/tracker/cve-2019-11479

Trust: 0.8

url:https://www.suse.com/c/suse-addresses-the-sack-panic-tcp-remote-denial-of-service-attacks/https://www.suse.com/support/kb/doc/?id=7023928

Trust: 0.8

url:https://usn.ubuntu.com/4017-1/https://usn.ubuntu.com/4017-2/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11478

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-11477

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2019-11479

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-11477

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-11479

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-11478

Trust: 0.3

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://bugzilla.redhat.com/):

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10287

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.18.0-1014.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.18.0-1018.20

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.0.0-1008.8

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1041.43~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1048.55

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1115.121

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1034.36~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1043.48

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-52.56

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.18.0-1013.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1055.59

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1111.120

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1015.17

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/5.0.0-1014.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.18.0-1020.20

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1038.40

Trust: 0.1

url:https://usn.ubuntu.com/4017-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-52.56~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1036.36

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.18.0-1020.20~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/5.0.0-1010.10

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.4.0-151.178

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.18.0-22.23

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.0.0-1008.8

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1034.36

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.0.0-17.18

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1041.43

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.18.0-1016.18

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1085.96

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1047.51

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.0.0-1008.8

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/4.18.0-22.23~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1015.17~16.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10167

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10166

Trust: 0.1

url:https://access.redhat.com/articles/2974891

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10166

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10168

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10161

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10168

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10161

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10167

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2019:1482

Trust: 0.1

sources: CERT/CC: VU#905115 // VULHUB: VHN-143127 // PACKETSTORM: 153328 // PACKETSTORM: 153543 // PACKETSTORM: 153318 // PACKETSTORM: 153430 // NVD: CVE-2019-11477

CREDITS

Red Hat

Trust: 0.3

sources: PACKETSTORM: 153543 // PACKETSTORM: 153318 // PACKETSTORM: 153430

SOURCES

db:CERT/CCid:VU#905115
db:VULHUBid:VHN-143127
db:PACKETSTORMid:153328
db:PACKETSTORMid:153543
db:PACKETSTORMid:153318
db:PACKETSTORMid:153430
db:NVDid:CVE-2019-11477

LAST UPDATE DATE

2026-04-13T23:02:39.914000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#905115date:2019-07-08T00:00:00
db:VULHUBid:VHN-143127date:2023-01-17T00:00:00
db:NVDid:CVE-2019-11477date:2024-11-21T04:21:09.480

SOURCES RELEASE DATE

db:CERT/CCid:VU#905115date:2019-06-20T00:00:00
db:VULHUBid:VHN-143127date:2019-06-19T00:00:00
db:PACKETSTORMid:153328date:2019-06-18T15:44:18
db:PACKETSTORMid:153543date:2019-07-08T14:38:09
db:PACKETSTORMid:153318date:2019-06-17T19:16:21
db:PACKETSTORMid:153430date:2019-06-25T23:50:27
db:NVDid:CVE-2019-11477date:2019-06-19T00:15:12.640