Description
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
Published: 2018-08-06
Score: 7.5 High
EPSS: 11.4% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1466-1 linux-4.9 security update
Debian DSA Debian DSA DSA-4266-1 linux security update
Ubuntu USN Ubuntu USN USN-3732-1 Linux kernel vulnerability
Ubuntu USN Ubuntu USN USN-3732-2 Linux kernel (HWE) vulnerability
Ubuntu USN Ubuntu USN USN-3741-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3741-2 Linux kernel (Xenial HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3742-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3742-2 Linux kernel (Trusty HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3763-1 Linux kernel vulnerability
References
Link Providers
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt cve-icon cve-icon
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/06/28/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/07/06/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/07/06/4 cve-icon cve-icon
http://www.securityfocus.com/bid/104976 cve-icon cve-icon
http://www.securitytracker.com/id/1041424 cve-icon cve-icon
http://www.securitytracker.com/id/1041434 cve-icon cve-icon
https://access.redhat.com/articles/3553061 cve-icon
https://access.redhat.com/errata/RHSA-2018:2384 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2395 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2402 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2403 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2645 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2776 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2785 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2789 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2790 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2791 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2924 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2933 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2948 cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e cve-icon cve-icon
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2018-5390 cve-icon
https://security.netapp.com/advisory/ntap-20180815-0003/ cve-icon cve-icon
https://support.f5.com/csp/article/K95343321 cve-icon cve-icon
https://support.f5.com/csp/article/K95343321?utm_source=f5support&amp%3Butm_medium=RSS cve-icon cve-icon
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp cve-icon cve-icon
https://usn.ubuntu.com/3732-1/ cve-icon cve-icon
https://usn.ubuntu.com/3732-2/ cve-icon cve-icon
https://usn.ubuntu.com/3741-1/ cve-icon cve-icon
https://usn.ubuntu.com/3741-2/ cve-icon cve-icon
https://usn.ubuntu.com/3742-1/ cve-icon cve-icon
https://usn.ubuntu.com/3742-2/ cve-icon cve-icon
https://usn.ubuntu.com/3763-1/ cve-icon cve-icon
https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2018-5390 cve-icon
https://www.debian.org/security/2018/dsa-4266 cve-icon cve-icon
https://www.kb.cert.org/vuls/id/962459 cve-icon cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujul2020.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html cve-icon cve-icon
https://www.spinics.net/lists/netdev/msg514742.html cve-icon
https://www.synology.com/support/security/Synology_SA_18_41 cve-icon cve-icon
History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.13429}

epss

{'score': 0.19919}


Subscriptions

A10networks Advanced Core Operating System
Canonical Ubuntu Linux
Cisco Collaboration Meeting Rooms Digital Network Architecture Center Expressway Expressway Series Meeting Management Network Assurance Engine Telepresence Conductor Telepresence Conductor Firmware Telepresence Video Communication Server Telepresence Video Communication Server Firmware Threat Grid-cloud Webex Hybrid Data Security Webex Video Mesh
Debian Debian Linux
F5 Big-ip Access Policy Manager Big-ip Advanced Firewall Manager Big-ip Analytics Big-ip Application Acceleration Manager Big-ip Application Security Manager Big-ip Domain Name System Big-ip Edge Gateway Big-ip Fraud Protection Service Big-ip Global Traffic Manager Big-ip Link Controller Big-ip Local Traffic Manager Big-ip Policy Enforcement Manager Big-ip Webaccelerator Traffix Systems Signaling Delivery Controller
Hp Aruba Airwave Amp Aruba Clearpass Policy Manager
Linux Linux Kernel
Redhat Enterprise Linux Enterprise Linux Desktop Enterprise Linux Server Enterprise Linux Server Aus Enterprise Linux Server Eus Enterprise Linux Server Tus Enterprise Linux Workstation Enterprise Mrg Rhel Aus Rhel E4s Rhel Eus Rhel Extras Rt Rhel Tus Virtualization
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-05T05:33:44.409Z

Reserved: 2018-01-12T00:00:00.000Z

Link: CVE-2018-5390

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-08-06T20:29:01.570

Modified: 2024-11-21T04:08:43.610

Link: CVE-2018-5390

cve-icon Redhat

Severity : Important

Publid Date: 2018-08-06T00:00:00Z

Links: CVE-2018-5390 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses