CVE-2019-11477
19.06.2019, 00:15
Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 2.6.29 ≤ 𝑥 < 3.16.69 |
linux | linux_kernel | 3.17 ≤ 𝑥 < 4.4.182 |
linux | linux_kernel | 4.5 ≤ 𝑥 < 4.9.182 |
linux | linux_kernel | 4.10 ≤ 𝑥 < 4.14.127 |
linux | linux_kernel | 4.15 ≤ 𝑥 < 4.19.52 |
linux | linux_kernel | 4.20 ≤ 𝑥 < 5.1.11 |
f5 | big-ip_advanced_firewall_manager | 11.5.2 ≤ 𝑥 ≤ 11.6.4 |
f5 | big-ip_advanced_firewall_manager | 12.1.0 ≤ 𝑥 ≤ 12.1.4 |
f5 | big-ip_advanced_firewall_manager | 13.1.0 ≤ 𝑥 ≤ 13.1.1 |
f5 | big-ip_advanced_firewall_manager | 14.0.0 ≤ 𝑥 ≤ 14.1.0 |
f5 | big-ip_advanced_firewall_manager | 15.0.0 |
f5 | big-ip_access_policy_manager | 11.5.2 ≤ 𝑥 ≤ 11.6.4 |
f5 | big-ip_access_policy_manager | 12.1.0 ≤ 𝑥 ≤ 12.1.4 |
f5 | big-ip_access_policy_manager | 13.1.0 ≤ 𝑥 ≤ 13.1.1 |
f5 | big-ip_access_policy_manager | 14.0.0 ≤ 𝑥 ≤ 14.1.0 |
f5 | big-ip_access_policy_manager | 15.0.0 |
f5 | big-ip_application_acceleration_manager | 11.5.2 ≤ 𝑥 ≤ 11.6.4 |
f5 | big-ip_application_acceleration_manager | 12.1.0 ≤ 𝑥 ≤ 12.1.4 |
f5 | big-ip_application_acceleration_manager | 13.1.0 ≤ 𝑥 ≤ 13.1.1 |
f5 | big-ip_application_acceleration_manager | 14.0.0 ≤ 𝑥 ≤ 14.1.0 |
f5 | big-ip_application_acceleration_manager | 15.0.0 |
f5 | big-ip_link_controller | 11.5.2 ≤ 𝑥 ≤ 11.6.4 |
f5 | big-ip_link_controller | 12.1.0 ≤ 𝑥 ≤ 12.1.4 |
f5 | big-ip_link_controller | 13.1.0 ≤ 𝑥 ≤ 13.1.1 |
f5 | big-ip_link_controller | 14.0.0 ≤ 𝑥 ≤ 14.1.0 |
f5 | big-ip_link_controller | 15.0.0 |
f5 | big-ip_policy_enforcement_manager | 11.5.2 ≤ 𝑥 ≤ 11.6.4 |
f5 | big-ip_policy_enforcement_manager | 12.1.0 ≤ 𝑥 ≤ 12.1.4 |
f5 | big-ip_policy_enforcement_manager | 13.1.0 ≤ 𝑥 ≤ 13.1.1 |
f5 | big-ip_policy_enforcement_manager | 14.0.0 ≤ 𝑥 ≤ 14.1.0 |
f5 | big-ip_policy_enforcement_manager | 15.0.0 |
f5 | big-ip_webaccelerator | 11.5.2 ≤ 𝑥 ≤ 11.6.4 |
f5 | big-ip_webaccelerator | 12.1.0 ≤ 𝑥 ≤ 12.1.4 |
f5 | big-ip_webaccelerator | 13.1.0 ≤ 𝑥 ≤ 13.1.1 |
f5 | big-ip_webaccelerator | 14.0.0 ≤ 𝑥 ≤ 14.1.0 |
f5 | big-ip_webaccelerator | 15.0.0 |
f5 | big-ip_application_security_manager | 11.5.2 ≤ 𝑥 ≤ 11.6.4 |
f5 | big-ip_application_security_manager | 12.1.0 ≤ 𝑥 ≤ 12.1.4 |
f5 | big-ip_application_security_manager | 13.1.0 ≤ 𝑥 ≤ 13.1.1 |
f5 | big-ip_application_security_manager | 14.0.0 ≤ 𝑥 ≤ 14.1.0 |
f5 | big-ip_application_security_manager | 15.0.0 |
f5 | big-ip_local_traffic_manager | 11.5.2 ≤ 𝑥 ≤ 11.6.4 |
f5 | big-ip_local_traffic_manager | 12.1.0 ≤ 𝑥 ≤ 12.1.4 |
f5 | big-ip_local_traffic_manager | 13.1.0 ≤ 𝑥 ≤ 13.1.1 |
f5 | big-ip_local_traffic_manager | 14.0.0 ≤ 𝑥 ≤ 14.1.0 |
f5 | big-ip_local_traffic_manager | 15.0.0 |
f5 | big-ip_fraud_protection_service | 11.5.2 ≤ 𝑥 ≤ 11.6.4 |
f5 | big-ip_fraud_protection_service | 12.1.0 ≤ 𝑥 ≤ 12.1.4 |
f5 | big-ip_fraud_protection_service | 13.1.0 ≤ 𝑥 ≤ 13.1.1 |
f5 | big-ip_fraud_protection_service | 14.0.0 ≤ 𝑥 ≤ 14.1.0 |
f5 | big-ip_fraud_protection_service | 15.0.0 |
f5 | big-ip_global_traffic_manager | 11.5.2 ≤ 𝑥 ≤ 11.6.4 |
f5 | big-ip_global_traffic_manager | 12.1.0 ≤ 𝑥 ≤ 12.1.4 |
f5 | big-ip_global_traffic_manager | 13.1.0 ≤ 𝑥 ≤ 13.1.1 |
f5 | big-ip_global_traffic_manager | 14.0.0 ≤ 𝑥 ≤ 14.1.0 |
f5 | big-ip_global_traffic_manager | 15.0.0 |
f5 | big-ip_analytics | 11.5.2 ≤ 𝑥 ≤ 11.6.4 |
f5 | big-ip_analytics | 12.1.0 ≤ 𝑥 ≤ 12.1.4 |
f5 | big-ip_analytics | 13.1.0 ≤ 𝑥 ≤ 13.1.1 |
f5 | big-ip_analytics | 14.0.0 ≤ 𝑥 ≤ 14.1.0 |
f5 | big-ip_analytics | 15.0.0 |
f5 | big-ip_edge_gateway | 11.5.2 ≤ 𝑥 ≤ 11.6.4 |
f5 | big-ip_edge_gateway | 12.1.0 ≤ 𝑥 ≤ 12.1.4 |
f5 | big-ip_edge_gateway | 13.1.0 ≤ 𝑥 ≤ 13.1.1 |
f5 | big-ip_edge_gateway | 14.0.0 ≤ 𝑥 ≤ 14.1.0 |
f5 | big-ip_edge_gateway | 15.0.0 |
f5 | big-ip_domain_name_system | 11.5.2 ≤ 𝑥 ≤ 11.6.4 |
f5 | big-ip_domain_name_system | 12.1.0 ≤ 𝑥 ≤ 12.1.4 |
f5 | big-ip_domain_name_system | 13.1.0 ≤ 𝑥 ≤ 13.1.1 |
f5 | big-ip_domain_name_system | 14.0.0 ≤ 𝑥 ≤ 14.1.0 |
f5 | big-ip_domain_name_system | 15.0.0 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 18.10 |
canonical | ubuntu_linux | 19.04 |
redhat | enterprise_linux_atomic_host | - |
redhat | enterprise_linux | 5.0 |
redhat | enterprise_linux | 6.0 |
redhat | enterprise_linux | 7.0 |
redhat | enterprise_linux | 8.0 |
redhat | enterprise_linux_aus | 6.5 |
redhat | enterprise_linux_aus | 6.6 |
redhat | enterprise_linux_eus | 7.4 |
redhat | enterprise_linux_eus | 7.5 |
redhat | enterprise_mrg | 2.0 |
ivanti | connect_secure | - |
pulsesecure | pulse_policy_secure | - |
pulsesecure | pulse_secure_virtual_application_delivery_controller | - |
f5 | traffix_signaling_delivery_controller | 5.0.0 ≤ 𝑥 ≤ 5.1.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
linux |
| ||||||||||
linux-aws |
| ||||||||||
linux-aws-hwe |
| ||||||||||
linux-azure |
| ||||||||||
linux-azure-edge |
| ||||||||||
linux-euclid |
| ||||||||||
linux-flo |
| ||||||||||
linux-gcp |
| ||||||||||
linux-gcp-edge |
| ||||||||||
linux-gke |
| ||||||||||
linux-gke-4.15 |
| ||||||||||
linux-gke-5.0 |
| ||||||||||
linux-goldfish |
| ||||||||||
linux-grouper |
| ||||||||||
linux-hwe |
| ||||||||||
linux-hwe-edge |
| ||||||||||
linux-kvm |
| ||||||||||
linux-lts-trusty |
| ||||||||||
linux-lts-utopic |
| ||||||||||
linux-lts-vivid |
| ||||||||||
linux-lts-wily |
| ||||||||||
linux-lts-xenial |
| ||||||||||
linux-maguro |
| ||||||||||
linux-mako |
| ||||||||||
linux-manta |
| ||||||||||
linux-oem |
| ||||||||||
linux-oracle |
| ||||||||||
linux-raspi2 |
| ||||||||||
linux-snapdragon |
|
References