{"id":8903,"date":"2019-06-25T03:11:58","date_gmt":"2019-06-25T03:11:58","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=8903"},"modified":"2019-06-25T03:11:58","modified_gmt":"2019-06-25T03:11:58","slug":"linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\/","title":{"rendered":"Linux Kernel Multiple Remote Denial-of-Service Vulnerabilities Threat Alert"},"content":{"rendered":"<h2><strong>Overview<\/strong><\/h2>\n<p>Recently, Red Hat released a security bulletin, pointing out multiple TCP-based remote denial-of-service vulnerabilities in the Linux kernel, namely, a SACK Panic vulnerability of important severity and two other vulnerabilities of moderate severity.<!--more--><\/p>\n<p>Reference:<\/p>\n<p><strong>https:\/\/access.redhat.com\/security\/vulnerabilities\/tcpsack<\/strong><\/p>\n<h2><strong>Vulnerability Overview<\/strong><\/h2>\n<h3><strong>CVE-2019-11477 SACK Panic<\/strong><\/h3>\n<p>CVE-2019-11477 is an integer overflow vulnerability called SACK Panic, which can be triggered by a remote attacker by sending a sequence of Selected Acknowledgement (SACK) TCP packets to a vulnerable system, possibly leading to a system crash. Successful exploitation of this vulnerability will cause denial-of-service (DoS) conditions to affected systems.<\/p>\n<ul>\n<li>Affected versions:<\/li>\n<\/ul>\n<p>Linux kernel &gt;= 2.6.29<\/p>\n<ul>\n<li>Stable kernel versions that have fixed this vulnerability:<\/li>\n<\/ul>\n<p>Linux kernel 4.4.182, 4.9.182, 4.14.127, 4.19.52, and 5.1.11<\/p>\n<h3><strong>Solutions:<\/strong><\/h3>\n<p>Use the detection script given in the following link to check whether your current system is vulnerable:<\/p>\n<p><strong>https:\/\/access.redhat.com\/security\/vulnerabilities\/tcpsack<\/strong><\/p>\n<p>Apply patches:<\/p>\n<p>PATCH_net_1_4.patch fixes the vulnerability in Linux kernel &gt;= 2.6.29 and can be found in the following link:<\/p>\n<p><a href=\"https:\/\/github.com\/Netflix\/security-bulletins\/blob\/master\/advisories\/third-party\/2019-001\/PATCH_net_1_4.patch\"><strong>https:\/\/github.com\/Netflix\/security-bulletins\/blob\/master\/advisories\/third-party\/2019-001\/PATCH_net_1_4.patch<\/strong><\/a><\/p>\n<p>Linux kernel &gt;= 4.14 needs a second patch, PATCH_net_1a.patch:<\/p>\n<p><a href=\"https:\/\/github.com\/Netflix\/security-bulletins\/blob\/master\/advisories\/third-party\/2019-001\/PATCH_net_1a.patch\"><strong>https:\/\/github.com\/Netflix\/security-bulletins\/blob\/master\/advisories\/third-party\/2019-001\/PATCH_net_1a.patch<\/strong><\/a><\/p>\n<p>Alternatively, disable SACK by setting <strong>\/proc\/sys\/net\/ipv4\/tcp_sack<\/strong> to <strong>0<\/strong>.<\/p>\n<p>For more mitigations, please visit:<\/p>\n<p><a href=\"https:\/\/github.com\/Netflix\/security-bulletins\/blob\/master\/advisories\/third-party\/2019-001.md\"><strong>https:\/\/github.com\/Netflix\/security-bulletins\/blob\/master\/advisories\/third-party\/2019-001.md<\/strong><\/a><\/p>\n<h3><strong>CVE-2019-11478 SACK Slowness or Excess Resource Usage<\/strong><\/h3>\n<p>CVE-2019-11478 is an excess resource usage vulnerability, which can be triggered by a remote attacker by sending a sequence of SACK TCP packets, leading to fragmentation of the TCP retransmission queue. Besides, on a Linux kernel before 4.15, an attacker can further exploit the fragmented queue to cause an expensive linked-list walk for subsequent SACKs received for the same TCP connection, adding to the fragmentation. That is why this vulnerability is called &#8220;SACK slowness&#8221;. Successful exploitation of this vulnerability will have a significant impact on the system performance and may cause a denial of service.<\/p>\n<ul>\n<li>Affected versions:<\/li>\n<\/ul>\n<p>SACK slowness affects Linux kernel earlier than 4.15<\/p>\n<p>Excess resource usage affects all version of the Linux kernel<\/p>\n<ul>\n<li>Stable kernel versions that have fixed this vulnerability:<\/li>\n<\/ul>\n<p>Linux kernel 4.4.182, 4.9.182, 4.14.127, 4.19.52, and 5.1.11<\/p>\n<h3><strong>Solutions:<\/strong><\/h3>\n<p>Apply PATCH_net_2_4.patch:<\/p>\n<p><a href=\"https:\/\/github.com\/Netflix\/security-bulletins\/blob\/master\/advisories\/third-party\/2019-001\/PATCH_net_2_4.patch\"><strong>https:\/\/github.com\/Netflix\/security-bulletins\/blob\/master\/advisories\/third-party\/2019-001\/PATCH_net_2_4.patch<\/strong><\/a><\/p>\n<p>Alternatively, disable SACK by setting <strong>\/proc\/sys\/net\/ipv4\/tcp_sack<\/strong> to <strong>0<\/strong>.<\/p>\n<p>For more mitigations, please visit:<\/p>\n<p><a href=\"https:\/\/github.com\/Netflix\/security-bulletins\/blob\/master\/advisories\/third-party\/2019-001.md\"><strong>https:\/\/github.com\/Netflix\/security-bulletins\/blob\/master\/advisories\/third-party\/2019-001.md<\/strong><\/a><\/p>\n<h3><strong>CVE-2019-11479<\/strong><\/h3>\n<p>CVE-2019-11479 is an excess resource usage vulnerability, which can be triggered by a remote attacker by setting a low value for the Maximum Segment Size (MSS) to cause a vulnerable system to utilize excessive bandwidths and resources. Successful exploitation of this vulnerability will cause an affected system to run with the maximum resource usage, thus degrading the system performance.<\/p>\n<ul>\n<li>Affected versions:<\/li>\n<\/ul>\n<p>All versions of the Linux kernel<\/p>\n<ul>\n<li>Stable kernel versions that have fixed this vulnerability:<\/li>\n<\/ul>\n<p>Linux kernel 4.4.182, 4.9.182, 4.14.127, 4.19.52, and 5.1.11<\/p>\n<h3><strong>Solutions:<\/strong><\/h3>\n<p>Apply PATCH_net_3_4.patch (<a href=\"https:\/\/github.com\/Netflix\/security-bulletins\/blob\/master\/advisories\/third-party\/2019-001\/PATCH_net_3_4.patch\"><strong>https:\/\/github.com\/Netflix\/security-bulletins\/blob\/master\/advisories\/third-party\/2019-001\/PATCH_net_3_4.patch<\/strong><\/a>) and PATCH_net_4_4.patch (<strong>https:\/\/github.com\/Netflix\/security-bulletins\/blob\/master\/advisories\/third-party\/2019-001\/PATCH_net_4_4.patch<\/strong>).<\/p>\n<p>For more mitigations, please visit:<\/p>\n<p><a href=\"https:\/\/github.com\/Netflix\/security-bulletins\/blob\/master\/advisories\/third-party\/2019-001.md\"><strong>https:\/\/github.com\/Netflix\/security-bulletins\/blob\/master\/advisories\/third-party\/2019-001.md<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb18-09.html\">https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb18-09.html<\/a><\/p>\n<h2><strong>Statement<\/strong><\/h2>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<h2><strong>About NSFOCUS<\/strong><\/h2>\n<p>NSFOCUS IB is a wholly owned subsidiary of NSFOCUS, an enterprise application and network security provider, with operations in the Americas, Europe, the Middle East, Southeast Asia and Japan. NSFOCUS IB has a proven track record of combatting the increasingly complex cyber threat landscape through the construction and implementation of multi-layered defense systems. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide unified, multi-layer protection from advanced cyber threats.<\/p>\n<p>For more information about NSFOCUS, please visit:<\/p>\n<p>https:\/\/www.nsfocusglobal.com.<\/p>\n<p>NSFOCUS, NSFOCUS IB, and NSFOCUS, INC. are trademarks or registered trademarks of NSFOCUS, Inc. All other names and trademarks are property of their respective firms.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Recently, Red Hat released a security bulletin, pointing out multiple TCP-based remote denial-of-service vulnerabilities in the Linux kernel, namely, a SACK Panic vulnerability of important severity and two other vulnerabilities of moderate severity.<\/p>\n","protected":false},"author":1,"featured_media":8904,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[493],"class_list":["post-8903","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-linux-vulnerability"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Linux Kernel Multiple Remote Denial-of-Service Vulnerabilities Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Linux Kernel Multiple Remote Denial-of-Service Vulnerabilities Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview Recently, Red Hat released a security bulletin, pointing out multiple TCP-based remote denial-of-service vulnerabilities in the Linux kernel,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-25T03:11:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/linux.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Linux Kernel Multiple Remote Denial-of-Service Vulnerabilities Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview Recently, Red Hat released a security bulletin, pointing out multiple TCP-based remote denial-of-service vulnerabilities in the Linux kernel,\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/linux.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Linux Kernel Multiple Remote Denial-of-Service Vulnerabilities Threat Alert\",\"datePublished\":\"2019-06-25T03:11:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\\\/\"},\"wordCount\":771,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/linux.jpg\",\"keywords\":[\"Linux Vulnerability\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\\\/\",\"name\":\"Linux Kernel Multiple Remote Denial-of-Service Vulnerabilities Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/linux.jpg\",\"datePublished\":\"2019-06-25T03:11:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/linux.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/linux.jpg\",\"width\":430,\"height\":222,\"caption\":\"Linux logo with Tux the penguin.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linux Kernel Multiple Remote Denial-of-Service Vulnerabilities Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Linux Kernel Multiple Remote Denial-of-Service Vulnerabilities Threat Alert - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Linux Kernel Multiple Remote Denial-of-Service Vulnerabilities Threat Alert - NSFOCUS","og_description":"Overview Recently, Red Hat released a security bulletin, pointing out multiple TCP-based remote denial-of-service vulnerabilities in the Linux kernel,","og_url":"https:\/\/nsfocusglobal.com\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2019-06-25T03:11:58+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/linux.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Linux Kernel Multiple Remote Denial-of-Service Vulnerabilities Threat Alert - NSFOCUS","twitter_description":"Overview Recently, Red Hat released a security bulletin, pointing out multiple TCP-based remote denial-of-service vulnerabilities in the Linux kernel,","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/linux.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Linux Kernel Multiple Remote Denial-of-Service Vulnerabilities Threat Alert","datePublished":"2019-06-25T03:11:58+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\/"},"wordCount":771,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/linux.jpg","keywords":["Linux Vulnerability"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\/","name":"Linux Kernel Multiple Remote Denial-of-Service Vulnerabilities Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/linux.jpg","datePublished":"2019-06-25T03:11:58+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/linux.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/06\/linux.jpg","width":430,"height":222,"caption":"Linux logo with Tux the penguin."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/linux-kernel-multiple-remote-denial-of-service-vulnerabilities-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Linux Kernel Multiple Remote Denial-of-Service Vulnerabilities Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=8903"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8903\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/8904"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=8903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=8903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=8903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}