First published: Sat Jun 29 2019(Updated: )
USN-4041-1 provided updates for the Linux kernel in Ubuntu. This update provides the corresponding updates for the Linux kernel for Ubuntu 16.04 ESM. USN-4017-2 fixed vulnerabilities in the Linux kernel. Unfortunately, the update introduced a regression that interfered with networking applications that setup very low SO_SNDBUF values. This update fixes the problem. We apologize for the inconvenience. Jonathan Looney discovered that the Linux kernel could be coerced into segmenting responses into multiple TCP segments. A remote attacker could construct an ongoing sequence of requests to cause a denial of service. (CVE-2019-11479)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-powerpc-smp-lts-xenial | <4.4.0.154.135 | 4.4.0.154.135 |
=14.04 | ||
All of | ||
ubuntu/linux-image-generic-lpae-lts-xenial | <4.4.0.154.135 | 4.4.0.154.135 |
=14.04 | ||
All of | ||
ubuntu/linux-image-generic-lts-xenial | <4.4.0.154.135 | 4.4.0.154.135 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-154-powerpc64-smp | <4.4.0-154.181~14.04.1 | 4.4.0-154.181~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-154-generic-lpae | <4.4.0-154.181~14.04.1 | 4.4.0-154.181~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-1048-aws | <4.4.0-1048.52 | 4.4.0-1048.52 |
=14.04 | ||
All of | ||
ubuntu/linux-image-powerpc64-emb-lts-xenial | <4.4.0.154.135 | 4.4.0.154.135 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-154-generic | <4.4.0-154.181~14.04.1 | 4.4.0-154.181~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-lowlatency-lts-xenial | <4.4.0.154.135 | 4.4.0.154.135 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-154-powerpc-smp | <4.4.0-154.181~14.04.1 | 4.4.0-154.181~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-154-powerpc-e500mc | <4.4.0-154.181~14.04.1 | 4.4.0-154.181~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-azure | <4.15.0.1049.36 | 4.15.0.1049.36 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-154-lowlatency | <4.4.0-154.181~14.04.1 | 4.4.0-154.181~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-aws | <4.4.0.1048.49 | 4.4.0.1048.49 |
=14.04 | ||
All of | ||
ubuntu/linux-image-powerpc64-smp-lts-xenial | <4.4.0.154.135 | 4.4.0.154.135 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.4.0-154-powerpc64-emb | <4.4.0-154.181~14.04.1 | 4.4.0-154.181~14.04.1 |
=14.04 | ||
All of | ||
ubuntu/linux-image-powerpc-e500mc-lts-xenial | <4.4.0.154.135 | 4.4.0.154.135 |
=14.04 | ||
All of | ||
ubuntu/linux-image-virtual-lts-xenial | <4.4.0.154.135 | 4.4.0.154.135 |
=14.04 | ||
All of | ||
ubuntu/linux-image-4.15.0-1049-azure | <4.15.0-1049.54~14.04.1 | 4.15.0-1049.54~14.04.1 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this update is CVE-2019-11479.
CVE-2019-11479 can lead to denial of service (DoS) attacks by consuming excessive resources on a target system.
To fix the CVE-2019-11479 vulnerability, you should update the Linux kernel to version 4.4.0.154.135 or later.
More information about CVE-2019-11479 can be found on the Ubuntu Security Notices website.
The Ubuntu Security Notice for this update can be found at: [Link to USN-4041-2]