<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56094#M11271</link>
    <description>&lt;P&gt;That's not how the script works. The script has a list of vulnerable RHEL kernels and checks &lt;FONT face="courier new,courier"&gt;uname -r&lt;/FONT&gt; versus this list.&lt;/P&gt;&lt;P&gt;Obviously only original RHEL kernels are included in the list, so you'll always get "not vulnerable" from that script for systems that have change the release string. That's the reason the script checks for &lt;EM&gt;el[5-8]&lt;/EM&gt; before running - it's only valid for RHEL and maybe CentOS.&lt;/P&gt;&lt;P&gt;There &lt;STRONG&gt;are&lt;/STRONG&gt; kernel releases in the list that are similar to the current gateway release kernel (2.6.18-92) as well as the current management kernel (3.10.0-693).&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="3"&gt;user@linux:~&amp;gt; grep 2.6.18-92 cve-2019-11477--2019-06-17-1629.sh&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'2.6.18-53.1.21.el5' '2.6.18-92.el5' '2.6.18-92.1.1.el5' '2.6.18-92.1.6.el5' '2.6.18-92.1.10.el5'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'2.6.18-92.1.13.el5' '2.6.18-92.1.17.el5' '2.6.18-92.1.18.el5' '2.6.18-92.1.22.el5' '2.6.18-128.el5'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;user@linux:~&amp;gt; grep 3.10.0-693 cve-2019-11477--2019-06-17-1629.sh &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.el7' '3.10.0-693.1.1.el7' '3.10.0-693.2.1.el7' '3.10.0-693.2.2.el7' '3.10.0-693.5.2.el7'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.5.2.p7ih.el7' '3.10.0-693.11.1.el7' '3.10.0-693.11.6.el7' '3.10.0-693.17.1.el7' '3.10.0-693.21.1.el7'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.25.2.el7' '3.10.0-693.25.4.el7' '3.10.0-693.25.7.el7' '3.10.0-693.33.1.el7' '3.10.0-693.35.1.el7'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.37.4.el7' '3.10.0-693.39.1.el7' '3.10.0-693.43.1.el7' '3.10.0-693.44.1.el7' '3.10.0-693.46.1.el7'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.47.2.el7' '3.10.0-861.el7' '3.10.0-862.el7' '3.10.0-862.2.3.el7' '3.10.0-862.3.2.el7'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.rt56.617.el7' '3.10.0-693.2.1.rt56.620.el7' '3.10.0-693.2.2.rt56.623.el7' '3.10.0-693.5.2.rt56.626.el7' '3.10.0-693.11.1.rt56.632.el7'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.11.1.rt56.639.el7' '3.10.0-693.17.1.rt56.636.el7' '3.10.0-693.21.1.rt56.639.el7' '3.10.0-861.rt56.803.el7' '3.10.0-862.rt56.804.el7'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-514.rt56.221.el6rt' '3.10.0-514.rt56.228.el6rt' '3.10.0-514.rt56.231.el6rt' '3.10.0-693.2.1.rt56.585.el6rt' '3.10.0-693.2.2.rt56.588.el6rt'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.5.2.rt56.592.el6rt' '3.10.0-693.11.1.rt56.597.el6rt' '3.10.0-693.11.1.rt56.606.el6rt' '3.10.0-693.17.1.rt56.604.el6rt' '3.10.0-693.21.1.rt56.607.el6rt'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.25.2.rt56.612.el6rt' '3.10.0-693.25.4.rt56.613.el6rt' '3.10.0-693.25.7.rt56.615.el6rt' '3.10.0-693.33.1.rt56.621.el6rt' '3.10.0-693.35.1.rt56.625.el6rt'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.37.4.rt56.629.el6rt' '3.10.0-693.39.1.rt56.629.el6rt' '3.10.0-693.43.1.rt56.630.el6rt' '3.10.0-693.44.1.rt56.633.el6rt' '3.10.0-693.46.1.rt56.639.el6rt'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.47.2.rt56.641.el6rt'&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As nobody knows from what sources and patches Check Point builds its packages, only Check Point can tell about the impact of Sad SACK.&lt;/P&gt;</description>
    <pubDate>Tue, 18 Jun 2019 14:08:08 GMT</pubDate>
    <dc:creator>Axel_Engeland</dc:creator>
    <dc:date>2019-06-18T14:08:08Z</dc:date>
    <item>
      <title>TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56043#M11249</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just wanted to ask for a statement from Check Point regarding&amp;nbsp;CVE-2019-11477, CVE-2019-11478 &amp;amp; CVE-2019-11479. As redhat posted a statement and mentioned several releases are affected my guess is, that Check Point with GAiA is affected too (as based on RH Linux...).&lt;/P&gt;&lt;P&gt;Details can be read below:&lt;/P&gt;&lt;P&gt;&lt;A href="https://access.redhat.com/security/vulnerabilities/tcpsack" target="_blank"&gt;https://access.redhat.com/security/vulnerabilities/tcpsack&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Maik&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 09:07:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56043#M11249</guid>
      <dc:creator>Maik</dc:creator>
      <dc:date>2019-06-18T09:07:32Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56065#M11262</link>
      <description>&lt;P&gt;That is easy: If you read the script, you find the kernel versions that are affected. If you comment put the RHEL 5-8 only lines, you get:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check Point Security Gateway R80.30&lt;/P&gt;
&lt;P&gt;Kernel 2.6.18-92cpx86_64&lt;/P&gt;
&lt;P&gt;Edition 64-bit&lt;/P&gt;
&lt;P&gt;Build 200&lt;/P&gt;
&lt;P&gt;---&lt;/P&gt;
&lt;P&gt;This script (v1.0) is primarily designed to detect CVE-2019-11477 on supported&lt;/P&gt;
&lt;P&gt;Red Hat Enterprise Linux systems and kernel packages.&lt;/P&gt;
&lt;P&gt;Result may be inaccurate for other RPM based systems.&lt;/P&gt;
&lt;P&gt;Running kernel: 2.6.18-92cpx86_64&lt;/P&gt;
&lt;P&gt;This system is Not affected&lt;/P&gt;
&lt;P&gt;---&lt;/P&gt;
&lt;P&gt;Check Point Security Management R80.30&lt;/P&gt;
&lt;P&gt;Kernel 3.10.0-693cpx86_64&lt;/P&gt;
&lt;P&gt;Edition 64-bit&lt;/P&gt;
&lt;P&gt;Build 200&lt;/P&gt;
&lt;P&gt;---&lt;/P&gt;
&lt;P&gt;This script (v1.0) is primarily designed to detect CVE-2019-11477 on supported&lt;/P&gt;
&lt;P&gt;Red Hat Enterprise Linux systems and kernel packages.&lt;/P&gt;
&lt;P&gt;Result may be inaccurate for other RPM based systems.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Running kernel: 3.10.0-693cpx86_64&lt;/P&gt;
&lt;P&gt;This system is Not affected&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 12:47:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56065#M11262</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-06-18T12:47:17Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56068#M11265</link>
      <description>Besides the Checkpoint firewalls themselves: How can vulnerable systems behind a Checkpoint be protected? Currently I cannot find an IPS protection for that vulnerability.</description>
      <pubDate>Tue, 18 Jun 2019 12:50:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56068#M11265</guid>
      <dc:creator>Christian_Riede</dc:creator>
      <dc:date>2019-06-18T12:50:56Z</dc:date>
    </item>
    <item>
      <title>TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56076#M11266</link>
      <description>&lt;P&gt;To protect devices behind the firewall that run an unsafe RedHat kernel version, see here:&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://access.redhat.com/security/vulnerabilities/tcpsack" target="_blank"&gt;https://access.redhat.com/security/vulnerabilities/tcpsack&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 13:05:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56076#M11266</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-06-18T13:05:26Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56077#M11267</link>
      <description>Well.. yes. I could chase up zillions of admins to fix their systems. But then I do not need a Checkpoint firewall. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;</description>
      <pubDate>Tue, 18 Jun 2019 13:08:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56077#M11267</guid>
      <dc:creator>Christian_Riede</dc:creator>
      <dc:date>2019-06-18T13:08:11Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56094#M11271</link>
      <description>&lt;P&gt;That's not how the script works. The script has a list of vulnerable RHEL kernels and checks &lt;FONT face="courier new,courier"&gt;uname -r&lt;/FONT&gt; versus this list.&lt;/P&gt;&lt;P&gt;Obviously only original RHEL kernels are included in the list, so you'll always get "not vulnerable" from that script for systems that have change the release string. That's the reason the script checks for &lt;EM&gt;el[5-8]&lt;/EM&gt; before running - it's only valid for RHEL and maybe CentOS.&lt;/P&gt;&lt;P&gt;There &lt;STRONG&gt;are&lt;/STRONG&gt; kernel releases in the list that are similar to the current gateway release kernel (2.6.18-92) as well as the current management kernel (3.10.0-693).&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier" size="3"&gt;user@linux:~&amp;gt; grep 2.6.18-92 cve-2019-11477--2019-06-17-1629.sh&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'2.6.18-53.1.21.el5' '2.6.18-92.el5' '2.6.18-92.1.1.el5' '2.6.18-92.1.6.el5' '2.6.18-92.1.10.el5'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'2.6.18-92.1.13.el5' '2.6.18-92.1.17.el5' '2.6.18-92.1.18.el5' '2.6.18-92.1.22.el5' '2.6.18-128.el5'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;user@linux:~&amp;gt; grep 3.10.0-693 cve-2019-11477--2019-06-17-1629.sh &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.el7' '3.10.0-693.1.1.el7' '3.10.0-693.2.1.el7' '3.10.0-693.2.2.el7' '3.10.0-693.5.2.el7'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.5.2.p7ih.el7' '3.10.0-693.11.1.el7' '3.10.0-693.11.6.el7' '3.10.0-693.17.1.el7' '3.10.0-693.21.1.el7'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.25.2.el7' '3.10.0-693.25.4.el7' '3.10.0-693.25.7.el7' '3.10.0-693.33.1.el7' '3.10.0-693.35.1.el7'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.37.4.el7' '3.10.0-693.39.1.el7' '3.10.0-693.43.1.el7' '3.10.0-693.44.1.el7' '3.10.0-693.46.1.el7'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.47.2.el7' '3.10.0-861.el7' '3.10.0-862.el7' '3.10.0-862.2.3.el7' '3.10.0-862.3.2.el7'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.rt56.617.el7' '3.10.0-693.2.1.rt56.620.el7' '3.10.0-693.2.2.rt56.623.el7' '3.10.0-693.5.2.rt56.626.el7' '3.10.0-693.11.1.rt56.632.el7'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.11.1.rt56.639.el7' '3.10.0-693.17.1.rt56.636.el7' '3.10.0-693.21.1.rt56.639.el7' '3.10.0-861.rt56.803.el7' '3.10.0-862.rt56.804.el7'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-514.rt56.221.el6rt' '3.10.0-514.rt56.228.el6rt' '3.10.0-514.rt56.231.el6rt' '3.10.0-693.2.1.rt56.585.el6rt' '3.10.0-693.2.2.rt56.588.el6rt'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.5.2.rt56.592.el6rt' '3.10.0-693.11.1.rt56.597.el6rt' '3.10.0-693.11.1.rt56.606.el6rt' '3.10.0-693.17.1.rt56.604.el6rt' '3.10.0-693.21.1.rt56.607.el6rt'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.25.2.rt56.612.el6rt' '3.10.0-693.25.4.rt56.613.el6rt' '3.10.0-693.25.7.rt56.615.el6rt' '3.10.0-693.33.1.rt56.621.el6rt' '3.10.0-693.35.1.rt56.625.el6rt'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.37.4.rt56.629.el6rt' '3.10.0-693.39.1.rt56.629.el6rt' '3.10.0-693.43.1.rt56.630.el6rt' '3.10.0-693.44.1.rt56.633.el6rt' '3.10.0-693.46.1.rt56.639.el6rt'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="3"&gt;'3.10.0-693.47.2.rt56.641.el6rt'&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As nobody knows from what sources and patches Check Point builds its packages, only Check Point can tell about the impact of Sad SACK.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 14:08:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56094#M11271</guid>
      <dc:creator>Axel_Engeland</dc:creator>
      <dc:date>2019-06-18T14:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56110#M11278</link>
      <description>&lt;P&gt;Could it be that the script doesn't know about the custom Checkpoint kernels?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the script it shows a lot of entries in the 2.6.18-92 range.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 16:48:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56110#M11278</guid>
      <dc:creator>Michael_Gonnaso</dc:creator>
      <dc:date>2019-06-18T16:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56111#M11279</link>
      <description>Our SK on the matter: &lt;A href="https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk156192" target="_blank"&gt;https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk156192&lt;/A&gt;&lt;BR /&gt;TL;DR: Yes, we're vulnerable, but you can disable TCP SACK as a workaround until a patch is developed.&lt;BR /&gt;&lt;BR /&gt;As for an IPS signature, there is an existing one related to TCP SACK for Windows, which I'm not sure applies here.&lt;BR /&gt;I'll double-check and update.</description>
      <pubDate>Tue, 18 Jun 2019 16:55:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56111#M11279</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-18T16:55:36Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56121#M11282</link>
      <description>&lt;P&gt;Given that these were disclosed on&amp;nbsp;&lt;SPAN&gt;2019-06-17, it is a bit premature to expect the IPS protection to be available 24 hours later.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Wishful thinking perhaps, but unlikely to happen.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 20:40:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56121#M11282</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-06-18T20:40:33Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56122#M11283</link>
      <description>We're working on it, will keep everyone posted.</description>
      <pubDate>Tue, 18 Jun 2019 20:41:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56122#M11283</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-18T20:41:46Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56143#M11293</link>
      <description>Is it possible to drop packet with low MSS?</description>
      <pubDate>Wed, 19 Jun 2019 03:35:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56143#M11293</guid>
      <dc:creator>Ceeeeb</dc:creator>
      <dc:date>2019-06-19T03:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56149#M11295</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;For VSX, will this deactivate TCP SACK for the entire system, or can we disable it only for the virtual systems that are exposed?</description>
      <pubDate>Wed, 19 Jun 2019 06:41:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56149#M11295</guid>
      <dc:creator>Sigbjorn</dc:creator>
      <dc:date>2019-06-19T06:41:19Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56151#M11296</link>
      <description>&lt;P&gt;Of course, the script states loud and clear that it can only talk about RHEL kernels - GAiA kernel is CP.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2019 07:11:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56151#M11296</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-06-19T07:11:11Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56160#M11298</link>
      <description>&lt;P&gt;sk156192 states for CVE-2019-11477, that only management servers are effected. Gateways are not listed, contrary to the other two CVEs.&lt;/P&gt;&lt;P&gt;Can you confirm that no gateways are effected by&amp;nbsp;CVE-2019-11477?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2019 08:20:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56160#M11298</guid>
      <dc:creator>Christoph</dc:creator>
      <dc:date>2019-06-19T08:20:14Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56178#M11307</link>
      <description>Any news about the signature? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;</description>
      <pubDate>Wed, 19 Jun 2019 12:47:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56178#M11307</guid>
      <dc:creator>Sven_Glock</dc:creator>
      <dc:date>2019-06-19T12:47:37Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56204#M11318</link>
      <description>It's a Linux kernel issue, which means it can't be enabled/disabled on a per-VS basis.&lt;BR /&gt;As I noted, we are planning a hotfix on this, stay tuned.</description>
      <pubDate>Wed, 19 Jun 2019 16:35:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56204#M11318</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-19T16:35:07Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56205#M11319</link>
      <description>Gateways running the 3.10 kernel are impacted by this and are specifically listed in the SK.&lt;BR /&gt;Gateways running the 2.6 kernel are not impacted by this.</description>
      <pubDate>Wed, 19 Jun 2019 16:38:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56205#M11319</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-19T16:38:47Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56214#M11322</link>
      <description>&lt;P&gt;As there's only one kernel running on VSX, it would be a global setting. You cannot even set it per interface. This is a Linux limitation, not a Check Point one.&lt;/P&gt;&lt;P&gt;However, performance impact should be very low when exposed connections that don't have a high packet loss rate, as Selective ACK only plays a role in scenarios where you lose TCP packets.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2019 19:23:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56214#M11322</guid>
      <dc:creator>Axel_Engeland</dc:creator>
      <dc:date>2019-06-19T19:23:48Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56227#M11327</link>
      <description>&lt;P&gt;to add to&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;'s answer, VSs are running firewalls in User Mode. Kernel is for the whole environment, hence the parameters mentioned on our response SK will affect all VSX system at once.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2019 06:53:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56227#M11327</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-06-20T06:53:11Z</dc:date>
    </item>
    <item>
      <title>Re: TCP SACK PANIC - Kernel vulnerabilities  | Check Point affected?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56404#M11363</link>
      <description>It's in progress.</description>
      <pubDate>Fri, 21 Jun 2019 18:20:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TCP-SACK-PANIC-Kernel-vulnerabilities-Check-Point-affected/m-p/56404#M11363</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-21T18:20:29Z</dc:date>
    </item>
  </channel>
</rss>

