icon

We found results for “

CVE-2018-5391

Good to know:

icon

Date: September 6, 2018

The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.

Language: C

Severity Score

Related Resources (40)

Severity Score

Weakness Type (CWE)

Improper Input Validation

CWE-20

Uncontrolled Resource Consumption

CWE-400

Top Fix

icon

Upgrade Version

Upgrade to version linux - 4.18.1.arch1-1;linux-hardened - 4.18.2.a-1;linux-zen - 4.18.1.zen1-1;linux-lts - 4.14.72-1;linux-yocto - 4.8.26+gitAUTOINC+1c60e003c7_27efc3ba68

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): NONE
Availability (A): HIGH

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): LOW
Authentication (AU): NONE
Confidentiality (C): NONE
Integrity (I): NONE
Availability (A): COMPLETE
Additional information:

Do you need more information?

Contact Us