CVE-2019-11478
CVSS v3.0
7.5 (High)
CVSS v2.0
5 (Medium)
EPSS
96.74 % (100th)
Affected Products
24
Advisories
77
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.
Weaknesses
- CVE Status
- PUBLISHED
- CNA
- Canonical Ltd.
- Published Date
-
2019-06-19 00:15:12
(5 years ago) - Updated Date
-
2024-02-27 21:04:17
(6 months ago)
Affected Products
- Big-ip Access Policy Manager
- Big-ip Advanced Firewall Manager
- Big-ip Analytics
- Big-ip Application Acceleration Manager
- Big-ip Application Security Manager
- Big-ip Domain Name System
- Big-ip Edge Gateway
- Big-ip Fraud Protection Service
- Big-ip Global Traffic Manager
- Big-ip Link Controller
- Big-ip Local Traffic Manager
- Big-ip Policy Enforcement Manager
- Big-ip Webaccelerator
- Traffix Signaling Delivery Controller
Loading...
Loading...
Loading...
Configuration #1
|
Configuration #2
|
Configuration #3
|
Configuration #4
|
Configuration #5
|
Configuration #6
|
Configuration #7
|
Configuration #8
|
Configuration #9
|
Configuration #10
|
Configuration #11
|
Configuration #12
|
Configuration #13
|
Configuration #14
|
Configuration #15
|
Configuration #16
|
Configuration #17
|
Configuration #18
|
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...