{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T01:47:37.670","vulnerabilities":[{"cve":{"id":"CVE-2019-11479","sourceIdentifier":"security@ubuntu.com","published":"2019-06-19T00:15:12.767","lastModified":"2024-11-21T04:21:09.880","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363."},{"lang":"es","value":"Jonathan Looney descubrió que el tamaño máximo de segmento (MSS) por defecto del kernel de Linux está codificado a 48 bytes. Esto permite a un peer remoto fragmentar las colas de reenvío de TCP significativamente más que si se aplicara un MSS más grande. Un atacante remoto podría usar esto para causar una denegación de servicio. Esto se ha corregido en versiones de kernel estables 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, y se corrige en los commits 967c05aee439e6e5d7d805e195b3a20f5c433d6 y 5f3e2bf008c2221478101ee72f5c4ccccc"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV30":[{"source":"security@ubuntu.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security@ubuntu.com","type":"Secondary","description":[{"lang":"en","value":"CWE-405"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-770"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4","versionEndExcluding":"4.4.182","matchCriteriaId":"615F0E94-7028-46AC-8596-B2E2954ABD6E"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9","versionEndExcluding":"4.9.182","matchCriteriaId":"1F75BEF6-57E1-47B5-BDF0-0008301F86FD"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.14","versionEndExcluding":"4.14.127","matchCriteriaId":"4C4BEC3E-CBB3-4E58-852E-5CB83C138CE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"4.19.52","matchCriteriaId":"0BEA51EC-8392-483C-B680-1B4E5C2BC2DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.1","versionEndExcluding":"5.1.11","matchCriteriaId":"CAC35790-3805-476A-9F12-45973E609A23"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndExcluding":"11.6.5.1","matchCriteriaId":"BEBEAED8-341C-4C26-B55D-F6176D7BB2C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.5.1","matchCriteriaId":"1845A169-7B6C-4B7D-B8FC-0245DC1B4EEF"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"F1212E1D-1A8F-4C6C-9472-22CE48F21B61"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.0.1.1","matchCriteriaId":"E17D443D-9E5D-4F41-A539-6D7842B21E25"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.2","versionEndExcluding":"14.1.2.1","matchCriteriaId":"55FD34B0-E77C-4C4B-B278-624EF047415D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.0.1.1","matchCriteriaId":"7FFA9687-4655-4C45-ACE2-A957457BBD8B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndExcluding":"11.6.5.1","matchCriteriaId":"270B50ED-8C7C-4FFC-90D2-1F3AE322D2AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.5.1","matchCriteriaId":"EA130AF7-C25F-4C0B-ACAF-E7436C722431"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"1AE785C8-06CA-4B15-A72D-A7EB0F0895D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.0.1.1","matchCriteriaId":"58C8E163-2A45-4C64-A7C2-5686C1EB3C78"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.2","versionEndExcluding":"14.1.2.1","matchCriteriaId":"26AFAAA7-73A9-4F50-9028-467ED5781DB4"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.0.1.1","matchCriteriaId":"C24A8114-31AE-47C2-9FEE-52B69585D56A"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndExcluding":"11.6.5.1","matchCriteriaId":"F9F325BF-D919-4258-A418-7057B1AF7361"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.5.1","matchCriteriaId":"5F3CFB0D-DDA1-4CFF-BAB4-96EF72F4F777"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"D4D99030-AEA2-4DDF-AD7D-0ED66913D6FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.0.1.1","matchCriteriaId":"1503B2F8-3549-4E52-87E9-6F0FD91F1428"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.2","versionEndExcluding":"14.1.2.1","matchCriteriaId":"39A6D62D-BD9C-4BEA-B728-4B4E5857E201"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.0.1.1","matchCriteriaId":"E3922DE9-3D92-484E-9BA2-1C278A6EDECE"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndExcluding":"11.6.5.1","matchCriteriaId":"1655EA50-55B6-418A-B2FC-D40A0BFD3C02"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.5.1","matchCriteriaId":"BFA7EEBD-F6F6-4243-B57D-BE210D8E16CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"E2596EE8-47D2-41E1-BD32-955D80FD697B"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.0.1.1","matchCriteriaId":"44D33B41-F19D-4B46-9F9E-FC03051EBB0C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.2","versionEndExcluding":"14.1.2.1","matchCriteriaId":"2EA95D57-BBD5-4449-8F62-0B5C53F8E962"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.0.1.1","matchCriteriaId":"A6300DC5-7D1F-4098-AD61-2826252A1C63"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndExcluding":"11.6.5.1","matchCriteriaId":"AF9F166F-178C-4659-B323-9C6F754EB3D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.5.1","matchCriteriaId":"9866C62F-DA11-43B1-B475-A07B1B58933D"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"272A20C4-70D7-43AB-8B62-132466AB1E35"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.0.1.1","matchCriteriaId":"DE65180C-47C8-41CF-B6C7-181259605B2C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.2","versionEndExcluding":"14.1.2.1","matchCriteriaId":"AC8932E7-68AF-4850-9952-1275856EE198"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.0.1.1","matchCriteriaId":"D8E67E0B-E542-4863-99D8-B3836ECDC04D"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndExcluding":"11.6.5.1","matchCriteriaId":"9CC75783-D714-4095-8F2B-62AB6F9176B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.5.1","matchCriteriaId":"BC99D7B3-65E5-4C9E-9D34-FF9161295F86"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"F439E03A-FCE0-4865-986B-E21D52ED4470"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.0.1.1","matchCriteriaId":"54E703A5-F9F1-4DDA-8B70-D3C6F51038B6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.2","versionEndExcluding":"14.1.2.1","matchCriteriaId":"8D5F5BE5-319B-4358-8301-A59145F5E913"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.0.1.1","matchCriteriaId":"A0F6FDF3-A70E-4F37-975F-85735776B4B8"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndExcluding":"11.6.5.1","matchCriteriaId":"89B75BB7-5C62-45C2-8C44-1B52FB6DBAC0"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.5.1","matchCriteriaId":"2C21D1B2-2424-4A56-A179-431EDC41B929"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"19699BA9-2324-40C5-81B9-0EA6A45109AA"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.0.1.1","matchCriteriaId":"B8BA9BE0-1646-41EF-BCE2-7BD4021196C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.2","versionEndExcluding":"14.1.2.1","matchCriteriaId":"DFE32931-B9F0-4907-9370-E31F6862463E"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.0.1.1","matchCriteriaId":"9A58BD3F-F6D7-4EB3-B108-FEAA39262B75"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndExcluding":"11.6.5.1","matchCriteriaId":"1405C4B2-C3BB-4FD9-A0BA-5577B9E6D98E"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.5.1","matchCriteriaId":"591EA641-C103-4575-97D5-15D41B20E581"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"A3F3F4FD-8BB9-468D-B50F-B25B17AF0F3A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.0.1.1","matchCriteriaId":"63529AEA-8B74-4CA1-BADF-14514D243DC5"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.2","versionEndExcluding":"14.1.2.1","matchCriteriaId":"1C86750D-6944-4086-B06E-AEB186B6FD16"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.0.1.1","matchCriteriaId":"5485F6ED-F324-4124-9116-79E70909C5F7"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndExcluding":"11.6.5.1","matchCriteriaId":"7695656A-4E55-46A1-9243-C153C644C6F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.5.1","matchCriteriaId":"95EDA820-6FDE-44B9-89CE-B83847416CF4"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"6FEAA997-2F7E-4E93-AEAA-33215A6C09A9"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.0.1.1","matchCriteriaId":"A0E47FF6-A851-4588-9F39-B292D4147AE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.2","versionEndExcluding":"14.1.2.1","matchCriteriaId":"4971E086-5B5B-45A9-9940-1241027D72C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.0.1.1","matchCriteriaId":"AEEB875C-E0EC-467B-9296-861F042AED67"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndExcluding":"11.6.5.1","matchCriteriaId":"EE38A138-9145-4803-BB72-A86DD0C6036A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.5.1","matchCriteriaId":"DFF4B95E-40C6-4C8F-81BD-172A907CA5FD"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"67AA4DB9-A5B6-4AF2-B6FC-3C21913264BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.0.1.1","matchCriteriaId":"D960933D-9476-4473-A3FB-0032C051BE50"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.2","versionEndExcluding":"14.1.2.1","matchCriteriaId":"D8C2837A-1DB2-4FD1-831A-9C2F3D5FF171"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.0.1.1","matchCriteriaId":"AFFE4B6E-DB23-45FB-9075-FC6B52FC18FC"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndExcluding":"11.6.5.1","matchCriteriaId":"935B69E4-BE3C-48C8-952B-8234BFFF9264"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.5.1","matchCriteriaId":"09F6EC13-4398-48CB-B999-14FABE281247"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"E606B713-528D-4C6D-98C4-E9A93DB7A8E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.0.1.1","matchCriteriaId":"0FA8C03D-3661-446D-B502-BEB52B7B6305"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.2","versionEndExcluding":"14.1.2.1","matchCriteriaId":"F36620C8-27C9-43A3-9C97-788145D509D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.0.1.1","matchCriteriaId":"28054725-6775-4AEE-B686-FB690894D1C6"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndExcluding":"11.6.5.1","matchCriteriaId":"BF928EA3-2883-4679-BF98-5B064DD19F3A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.5.1","matchCriteriaId":"E7DEDB9D-58DB-45EB-91EA-8A6694E4F29A"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"34F29398-32A5-48F6-B144-B184BFFB1034"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.0.1.1","matchCriteriaId":"678B7FC3-6796-4159-BF2B-8FAD49E0F566"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.2","versionEndExcluding":"14.1.2.1","matchCriteriaId":"59ABE79F-7C3E-4244-BD2B-F9CC3A3A71E4"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.0.1.1","matchCriteriaId":"FC4E7530-C750-4AE5-A98D-12F3E3819869"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"11.5.2","versionEndExcluding":"11.6.5.1","matchCriteriaId":"4D1D81B3-B059-41A7-9DD1-101A2E199005"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.5.1","matchCriteriaId":"E69B6320-088E-445D-8863-34CF67F172F3"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndExcluding":"13.1.3.2","matchCriteriaId":"21987539-682A-4F8F-9FE7-526A054705FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.0.1.1","matchCriteriaId":"A7B34FC0-168E-4CA8-B1F4-BDC0D2213280"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.2","versionEndExcluding":"14.1.2.1","matchCriteriaId":"B3C12B9E-4995-47A2-8E3B-089C096469E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.0.1.1","matchCriteriaId":"BCB0A0A1-244E-432F-8144-9770CC4AB696"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","matchCriteriaId":"815D70A8-47D3-459C-A32C-9FEACA0659D1"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","matchCriteriaId":"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","matchCriteriaId":"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","matchCriteriaId":"07C312A0-CD2C-4B9C-B064-6409B25C278F"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","matchCriteriaId":"CD783B0C-9246-47D9-A937-6144FE8BFF0F"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"142AD0DD-4CF3-4D74-9442-459CE3347E3A"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*","versionStartIncluding":"5.1.0","versionEndIncluding":"5.4.0","matchCriteriaId":"928A7D30-8099-47B8-A1D2-A4997F54C1C2"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndIncluding":"6.1.0","matchCriteriaId":"F37D18F2-8C6A-4557-85DC-2A751595423C"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*","matchCriteriaId":"D5F5FEE7-059A-4A9B-BCCD-18F0AA435040"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:iworkflow:2.3.0:*:*:*:*:*:*:*","matchCriteriaId":"D3CE7526-9630-48EF-81FB-44904AF0653F"},{"vulnerable":true,"criteria":"cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndIncluding":"5.1.0","matchCriteriaId":"4E52F91D-3F39-4D89-8069-EC422FB1F700"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*","matchCriteriaId":"BB28F9AF-3D06-4532-B397-96D7E4792503"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"142AD0DD-4CF3-4D74-9442-459CE3347E3A"}]}]}],"references":[{"url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2019/06/28/2","source":"security@ubuntu.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2019/07/06/3","source":"security@ubuntu.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2019/07/06/4","source":"security@ubuntu.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/108818","source":"security@ubuntu.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://access.redhat.com/errata/RHSA-2019:1594","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2019:1602","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2019:1699","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://access.redhat.com/security/vulnerabilities/tcpsack","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=5f3e2bf008c2221478101ee72f5cb4654b9fc363","source":"security@ubuntu.com","tags":["Mailing List","Patch","Vendor Advisory"]},{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=967c05aee439e6e5d7d805e195b3a20ef5c433d6","source":"security@ubuntu.com","tags":["Mailing List","Patch","Vendor Advisory"]},{"url":"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md","source":"security@ubuntu.com","tags":["Patch","Third Party Advisory"]},{"url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10287","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0008","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20190625-0001/","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://support.f5.com/csp/article/K35421172","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://support.f5.com/csp/article/K35421172?utm_source=f5support&amp%3Butm_medium=RSS","source":"security@ubuntu.com"},{"url":"https://usn.ubuntu.com/4041-1/","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://usn.ubuntu.com/4041-2/","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic","source":"security@ubuntu.com","tags":["Mitigation","Third Party Advisory"]},{"url":"https://www.kb.cert.org/vuls/id/905115","source":"security@ubuntu.com","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.oracle.com/security-alerts/cpujan2020.html","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpuoct2020.html","source":"security@ubuntu.com"},{"url":"https://www.synology.com/security/advisory/Synology_SA_19_28","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://www.us-cert.gov/ics/advisories/icsa-19-253-03","source":"security@ubuntu.com","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.us-cert.gov/ics/advisories/icsma-20-170-06","source":"security@ubuntu.com","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2019/06/28/2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2019/07/06/3","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2019/07/06/4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/108818","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://access.redhat.com/errata/RHSA-2019:1594","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2019:1602","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://access.redhat.com/errata/RHSA-2019:1699","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://access.redhat.com/security/vulnerabilities/tcpsack","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=5f3e2bf008c2221478101ee72f5cb4654b9fc363","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Patch","Vendor Advisory"]},{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=967c05aee439e6e5d7d805e195b3a20ef5c433d6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Patch","Vendor Advisory"]},{"url":"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10287","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0008","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20190625-0001/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://support.f5.com/csp/article/K35421172","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://support.f5.com/csp/article/K35421172?utm_source=f5support&amp%3Butm_medium=RSS","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://usn.ubuntu.com/4041-1/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://usn.ubuntu.com/4041-2/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Third Party Advisory"]},{"url":"https://www.kb.cert.org/vuls/id/905115","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.oracle.com/security-alerts/cpujan2020.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.oracle.com/security-alerts/cpuoct2020.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.synology.com/security/advisory/Synology_SA_19_28","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.us-cert.gov/ics/advisories/icsa-19-253-03","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.us-cert.gov/ics/advisories/icsma-20-170-06","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}