CVE-2018-5391

The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
certccCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
VendorProductVersion
linuxlinux_kernel
3.9 ≤
𝑥
≤ 4.18
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
6.4
redhatenterprise_linux_server_aus
6.5
redhatenterprise_linux_server_aus
6.6
redhatenterprise_linux_server_aus
7.2
redhatenterprise_linux_server_aus
7.3
redhatenterprise_linux_server_aus
7.4
redhatenterprise_linux_server_eus
6.7
redhatenterprise_linux_server_eus
7.3
redhatenterprise_linux_server_eus
7.4
redhatenterprise_linux_server_eus
7.5
redhatenterprise_linux_server_tus
6.6
redhatenterprise_linux_server_tus
7.2
redhatenterprise_linux_server_tus
7.3
redhatenterprise_linux_server_tus
7.4
redhatenterprise_linux_workstation
6.0
redhatenterprise_linux_workstation
7.0
debiandebian_linux
8.0
debiandebian_linux
9.0
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
microsoftwindows_10
-
microsoftwindows_7
-
microsoftwindows_8.1
-
microsoftwindows_rt_8.1
-
microsoftwindows_server_2008
-
microsoftwindows_server_2012
-
microsoftwindows_server_2016
-
f5big-ip_access_policy_manager
11.5.1 ≤
𝑥
< 11.6.5.1
f5big-ip_access_policy_manager
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_access_policy_manager
13.0.0 ≤
𝑥
< 13.1.3
f5big-ip_access_policy_manager
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_access_policy_manager
14.1.0 ≤
𝑥
< 14.1.2.4
f5big-ip_advanced_firewall_manager
11.5.1 ≤
𝑥
< 11.6.5.1
f5big-ip_advanced_firewall_manager
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_advanced_firewall_manager
13.0.0 ≤
𝑥
< 13.1.3
f5big-ip_advanced_firewall_manager
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_advanced_firewall_manager
14.1.0 ≤
𝑥
< 14.1.2.4
f5big-ip_analytics
11.5.1 ≤
𝑥
< 11.6.5.1
f5big-ip_analytics
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_analytics
13.0.0 ≤
𝑥
< 13.1.3
f5big-ip_analytics
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_analytics
14.1.0 ≤
𝑥
< 14.1.2.4
f5big-ip_application_acceleration_manager
11.5.1 ≤
𝑥
< 11.6.5.1
f5big-ip_application_acceleration_manager
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_application_acceleration_manager
13.0.0 ≤
𝑥
< 13.1.3
f5big-ip_application_acceleration_manager
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_application_acceleration_manager
14.1.0 ≤
𝑥
< 14.1.2.4
f5big-ip_application_security_manager
11.5.1 ≤
𝑥
< 11.6.5.1
f5big-ip_application_security_manager
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_application_security_manager
13.0.0 ≤
𝑥
< 13.1.3
f5big-ip_application_security_manager
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_application_security_manager
14.1.0 ≤
𝑥
< 14.1.2.4
f5big-ip_domain_name_system
11.5.1 ≤
𝑥
< 11.6.5.1
f5big-ip_domain_name_system
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_domain_name_system
13.0.0 ≤
𝑥
< 13.1.3
f5big-ip_domain_name_system
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_domain_name_system
14.1.0 ≤
𝑥
< 14.1.2.4
f5big-ip_edge_gateway
11.5.1 ≤
𝑥
< 11.6.5.1
f5big-ip_edge_gateway
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_edge_gateway
13.0.0 ≤
𝑥
< 13.1.3
f5big-ip_edge_gateway
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_edge_gateway
14.1.0 ≤
𝑥
< 14.1.2.4
f5big-ip_fraud_protection_service
11.5.1 ≤
𝑥
< 11.6.5.1
f5big-ip_fraud_protection_service
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_fraud_protection_service
13.0.0 ≤
𝑥
< 13.1.3
f5big-ip_fraud_protection_service
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_fraud_protection_service
14.1.0 ≤
𝑥
< 14.1.2.4
f5big-ip_global_traffic_manager
11.5.1 ≤
𝑥
< 11.6.5.1
f5big-ip_global_traffic_manager
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_global_traffic_manager
13.0.0 ≤
𝑥
< 13.1.3
f5big-ip_global_traffic_manager
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_global_traffic_manager
14.1.0 ≤
𝑥
< 14.1.2.4
f5big-ip_link_controller
11.5.1 ≤
𝑥
< 11.6.5.1
f5big-ip_link_controller
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_link_controller
13.0.0 ≤
𝑥
< 13.1.3
f5big-ip_link_controller
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_link_controller
14.1.0 ≤
𝑥
< 14.1.2.4
f5big-ip_local_traffic_manager
11.5.1 ≤
𝑥
< 11.6.5.1
f5big-ip_local_traffic_manager
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_local_traffic_manager
13.0.0 ≤
𝑥
< 13.1.3
f5big-ip_local_traffic_manager
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_local_traffic_manager
14.1.0 ≤
𝑥
< 14.1.2.4
f5big-ip_policy_enforcement_manager
11.5.1 ≤
𝑥
< 11.6.5.1
f5big-ip_policy_enforcement_manager
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_policy_enforcement_manager
13.0.0 ≤
𝑥
< 13.1.3
f5big-ip_policy_enforcement_manager
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_policy_enforcement_manager
14.1.0 ≤
𝑥
< 14.1.2.4
f5big-ip_webaccelerator
11.5.1 ≤
𝑥
< 11.6.5.1
f5big-ip_webaccelerator
12.1.0 ≤
𝑥
< 12.1.5
f5big-ip_webaccelerator
13.0.0 ≤
𝑥
< 13.1.3
f5big-ip_webaccelerator
14.0.0 ≤
𝑥
< 14.0.1.1
f5big-ip_webaccelerator
14.1.0 ≤
𝑥
< 14.1.2.4
siemensruggedcom_rm1224_firmware
𝑥
< 6.1
siemensruggedcom_rox_ii_firmware
𝑥
< 2.13.3
siemensscalance_m-800_firmware
𝑥
< 6.1
siemensscalance_s615_firmware
𝑥
< 6.1
siemensscalance_sc-600_firmware
𝑥
< 2.0
siemensscalance_w1700_ieee_802.11ac_firmware
𝑥
< 2.0
siemensscalance_w700_ieee_802.11a\/b\/g\/n_firmware
𝑥
< 6.4
siemenssimatic_net_cp_1242-7_firmware
𝑥
< 3.2
siemenssimatic_net_cp_1243-1_firmware
𝑥
< 3.2
siemenssimatic_net_cp_1243-7_lte_eu_firmware
𝑥
< 3.2
siemenssimatic_net_cp_1243-7_lte_us_firmware
𝑥
< 3.2
siemenssimatic_net_cp_1243-8_irc_firmware
𝑥
< 3.2
siemenssimatic_net_cp_1542sp-1_firmware
𝑥
< 2.1
siemenssimatic_net_cp_1542sp-1_irc_firmware
𝑥
< 2.1
siemenssimatic_net_cp_1543-1_firmware
𝑥
< 2.2
siemenssimatic_net_cp_1543sp-1_firmware
𝑥
< 2.1
siemenssimatic_rf185c_firmware
𝑥
< 1.3
siemenssimatic_rf186c_firmware
𝑥
< 1.3
siemenssimatic_rf186ci_firmware
𝑥
< 1.3
siemenssimatic_rf188_firmware
𝑥
< 1.3
siemenssimatic_rf188ci_firmware
𝑥
< 1.3
siemenssinema_remote_connect_server_firmware
1.1 ≤
𝑥
< 2.0.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bullseye
5.10.223-1
fixed
bullseye (security)
5.10.226-1
fixed
bookworm
6.1.106-3
fixed
bookworm (security)
6.1.112-1
fixed
trixie
6.11.5-1
fixed
sid
6.11.6-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
cosmic
not-affected
bionic
Fixed 4.15.0-32.35
released
xenial
Fixed 4.4.0-133.159
released
trusty
Fixed 3.13.0-155.205
released
linux-aws
cosmic
not-affected
bionic
Fixed 4.15.0-1019.19
released
xenial
Fixed 4.4.0-1065.75
released
trusty
Fixed 4.4.0-1027.30
released
linux-azure
cosmic
not-affected
bionic
Fixed 4.15.0-1021.21
released
xenial
Fixed 4.15.0-1021.21~16.04.1
released
trusty
not-affected
linux-azure-edge
cosmic
dne
bionic
not-affected
xenial
Fixed 4.15.0-1021.21
released
trusty
dne
linux-euclid
cosmic
dne
bionic
dne
xenial
Fixed 4.4.0-9029.31
released
trusty
dne
linux-flo
cosmic
dne
bionic
dne
xenial
ignored
trusty
dne
linux-gcp
cosmic
not-affected
bionic
Fixed 4.15.0-1017.18
released
xenial
Fixed 4.15.0-1017.18~16.04.1
released
trusty
dne
linux-gke
cosmic
dne
bionic
dne
xenial
ignored
trusty
dne
linux-goldfish
cosmic
dne
bionic
dne
xenial
ignored
trusty
dne
linux-grouper
cosmic
dne
bionic
dne
xenial
dne
trusty
dne
linux-hwe
cosmic
dne
bionic
not-affected
xenial
Fixed 4.15.0-32.35~16.04.1
released
trusty
dne
linux-hwe-edge
cosmic
dne
bionic
not-affected
xenial
Fixed 4.15.0-32.35~16.04.1
released
trusty
dne
linux-kvm
cosmic
not-affected
bionic
Fixed 4.15.0-1019.19
released
xenial
Fixed 4.4.0-1031.37
released
trusty
dne
linux-lts-trusty
cosmic
dne
bionic
dne
xenial
dne
trusty
dne
linux-lts-utopic
cosmic
dne
bionic
dne
xenial
dne
trusty
dne
linux-lts-vivid
cosmic
dne
bionic
dne
xenial
dne
trusty
dne
linux-lts-wily
cosmic
dne
bionic
dne
xenial
dne
trusty
dne
linux-lts-xenial
cosmic
dne
bionic
dne
xenial
dne
trusty
Fixed 4.4.0-133.159~14.04.1
released
linux-maguro
cosmic
dne
bionic
dne
xenial
dne
trusty
dne
linux-mako
cosmic
dne
bionic
dne
xenial
ignored
trusty
dne
linux-manta
cosmic
dne
bionic
dne
xenial
dne
trusty
dne
linux-oem
cosmic
not-affected
bionic
Fixed 4.15.0-1015.18
released
xenial
ignored
trusty
dne
linux-raspi2
cosmic
not-affected
bionic
Fixed 4.15.0-1020.22
released
xenial
Fixed 4.4.0-1094.102
released
trusty
dne
linux-snapdragon
cosmic
dne
bionic
not-affected
xenial
Fixed 4.4.0-1098.103
released
trusty
dne
References