Korean
<< Back
VID 14224
Severity 40
Port 22
Protocol TCP
Class LSC
Detailed Description The remote system does not apply CESA-2019:1488 which is kernel security update. The system which does not apply the update is affected by the following vulnerabilities :

- An integer overflow flaw was found in the way the Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented. (CVE-2019-11477)

- Double free in lib/idr.c (CVE-2019-3896)

- excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478)

- excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)

Note: This check solely relied on the kernel RPM version of the remote system to assess this vulnerability, so this might be a false positive.

* References:
https://lists.centos.org/pipermail/centos-announce/2019-June/023332.html

* Platforms Affected:
CentOS Linux Server (v. 6)
Recommendation Update the affected packages.
Launch the graphical update tool through
System -> Administration -> Software Update

For a command line interface, use the following command to update the operating system:
# yum update
Related URL CVE-2019-11477,CVE-2019-11478,CVE-2019-11479,CVE-2019-3896 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)