Description
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1823-1 | linux security update |
Debian DLA |
DLA-1824-1 | linux-4.9 security update |
Debian DLA |
DLA-1862-1 | linux security update |
Debian DSA |
DSA-4465-1 | linux security update |
Debian DSA |
DSA-4484-1 | linux security update |
Ubuntu USN |
USN-4017-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4017-2 | Linux kernel vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
F5
Subscribe
Big-ip Access Policy Manager
Subscribe
Big-ip Advanced Firewall Manager
Subscribe
Big-ip Analytics
Subscribe
Big-ip Application Acceleration Manager
Subscribe
Big-ip Application Security Manager
Subscribe
Big-ip Domain Name System
Subscribe
Big-ip Edge Gateway
Subscribe
Big-ip Fraud Protection Service
Subscribe
Big-ip Global Traffic Manager
Subscribe
Big-ip Link Controller
Subscribe
Big-ip Local Traffic Manager
Subscribe
Big-ip Policy Enforcement Manager
Subscribe
Big-ip Webaccelerator
Subscribe
Traffix Signaling Delivery Controller
Subscribe
Ivanti
Subscribe
Connect Secure
Subscribe
Linux
Subscribe
Linux Kernel
Subscribe
Pulsesecure
Subscribe
Pulse Policy Secure
Subscribe
Pulse Secure Virtual Application Delivery Controller
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Atomic Host
Subscribe
Enterprise Linux Aus
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Mrg
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Extras Rt
Subscribe
Rhel Tus
Subscribe
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-09-16T23:45:54.779Z
Reserved: 2019-04-23T00:00:00.000Z
Link: CVE-2019-11478
No data.
Status : Modified
Published: 2019-06-19T00:15:12.687
Modified: 2024-11-21T04:21:09.703
Link: CVE-2019-11478
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN