SUSE: 2019:14089-1 important: the Linux Kernel
Summary
The SUSE Linux Enterprise 11 SP4 kernel version 3.0.101 was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2019-11477: A sequence of SACKs may have been crafted such that one can trigger an integer overflow, leading to a kernel panic. (bsc#1137586) - CVE-2019-11478: It was possible to send a crafted sequence of SACKs which will fragment the TCP retransmission queue. An attacker may have been able to further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. - CVE-2019-11479: It was possible to send a crafted sequence of SACKs which will fragment the RACK send map. A remote attacker may be able to further exploit the fragmented send map to cause an expensive linked-list walk for subsequent SACKs received for that same TCP connection. This would have resulted in excess resource consumption due ...
Read the Full AdvisoryReferences
#1110785 #1113769 #1119314 #1120326 #1120843
#1120885 #1131295 #1131543 #1132374 #1132472
#1132580 #1133188 #1134102 #1134729 #1134848
#1137586 #923908 #939260
Cross- CVE-2014-9710 CVE-2018-17972 CVE-2019-11190
CVE-2019-11477 CVE-2019-11478 CVE-2019-11479
CVE-2019-11486 CVE-2019-11884 CVE-2019-5489
Affected Products:
SUSE Linux Enterprise Server 11-SP4-LTSS
SUSE Linux Enterprise Server 11-EXTRA
SUSE Linux Enterprise Debuginfo 11-SP4
https://www.suse.com/security/cve/CVE-2014-9710.html
https://www.suse.com/security/cve/CVE-2018-17972.html
https://www.suse.com/security/cve/CVE-2019-11190.html
https://www.suse.com/security/cve/CVE-2019-11477.html
https://www.suse.com/security/cve/CVE-2019-11478.html
https://www.suse.com/security/cve/CVE-2019-11479.html
https://www.suse.com/security/cve/CVE-2...
Read the Full Advisory