Description
The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
Published: 2018-09-06
Score: 7.5 High
EPSS: 3.8% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1466-1 linux-4.9 security update
Debian DLA Debian DLA DLA-1715-1 linux-4.9 security update
Debian DSA Debian DSA DSA-4272-1 linux security update
EUVD EUVD EUVD-2018-17161 The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
Ubuntu USN Ubuntu USN USN-3740-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3740-2 Linux kernel (HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3741-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3741-2 Linux kernel (Xenial HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3742-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3742-2 Linux kernel (Trusty HWE) vulnerabilities
References
Link Providers
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt cve-icon cve-icon
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-linux-en cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/06/28/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/07/06/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/07/06/4 cve-icon cve-icon
http://www.securityfocus.com/bid/105108 cve-icon cve-icon
http://www.securitytracker.com/id/1041476 cve-icon cve-icon
http://www.securitytracker.com/id/1041637 cve-icon cve-icon
https://access.redhat.com/articles/3553061 cve-icon
https://access.redhat.com/errata/RHSA-2018:2785 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2791 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2846 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2924 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2925 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2933 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2948 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3083 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3096 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3459 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3540 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3586 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3590 cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=c30f1fc041b74ecdb072dd44f858750414b8b19f cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2018-5391 cve-icon
https://security.netapp.com/advisory/ntap-20181003-0002/ cve-icon cve-icon
https://support.f5.com/csp/article/K74374841?utm_source=f5support&amp%3Butm_medium=RSS cve-icon cve-icon
https://usn.ubuntu.com/3740-1/ cve-icon cve-icon
https://usn.ubuntu.com/3740-2/ cve-icon cve-icon
https://usn.ubuntu.com/3741-1/ cve-icon cve-icon
https://usn.ubuntu.com/3741-2/ cve-icon cve-icon
https://usn.ubuntu.com/3742-1/ cve-icon cve-icon
https://usn.ubuntu.com/3742-2/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2018-5391 cve-icon
https://www.debian.org/security/2018/dsa-4272 cve-icon cve-icon
https://www.kb.cert.org/vuls/id/641765 cve-icon cve-icon cve-icon
History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01637}

epss

{'score': 0.01732}


Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
F5 Big-ip Access Policy Manager Big-ip Advanced Firewall Manager Big-ip Analytics Big-ip Application Acceleration Manager Big-ip Application Security Manager Big-ip Domain Name System Big-ip Edge Gateway Big-ip Fraud Protection Service Big-ip Global Traffic Manager Big-ip Link Controller Big-ip Local Traffic Manager Big-ip Policy Enforcement Manager Big-ip Webaccelerator
Linux Linux Kernel
Microsoft Windows 10 Windows 7 Windows 8.1 Windows Rt 8.1 Windows Server 2008 Windows Server 2012 Windows Server 2016
Redhat Enterprise Linux Enterprise Linux Desktop Enterprise Linux Server Enterprise Linux Server Aus Enterprise Linux Server Eus Enterprise Linux Server Tus Enterprise Linux Workstation Enterprise Mrg Rhel Aus Rhel E4s Rhel Eus Rhel Extras Rt Rhel Tus
Siemens Ruggedcom Rm1224 Ruggedcom Rm1224 Firmware Ruggedcom Rox Ii Ruggedcom Rox Ii Firmware Scalance M-800 Scalance M-800 Firmware Scalance S615 Scalance S615 Firmware Scalance Sc-600 Scalance Sc-600 Firmware Scalance W1700 Ieee 802.11ac Scalance W1700 Ieee 802.11ac Firmware Scalance W700 Ieee 802.11a\/b\/g\/n Scalance W700 Ieee 802.11a\/b\/g\/n Firmware Simatic Net Cp 1242-7 Simatic Net Cp 1242-7 Firmware Simatic Net Cp 1243-1 Simatic Net Cp 1243-1 Firmware Simatic Net Cp 1243-7 Lte Eu Simatic Net Cp 1243-7 Lte Eu Firmware Simatic Net Cp 1243-7 Lte Us Simatic Net Cp 1243-7 Lte Us Firmware Simatic Net Cp 1243-8 Irc Simatic Net Cp 1243-8 Irc Firmware Simatic Net Cp 1542sp-1 Simatic Net Cp 1542sp-1 Firmware Simatic Net Cp 1542sp-1 Irc Simatic Net Cp 1542sp-1 Irc Firmware Simatic Net Cp 1543-1 Simatic Net Cp 1543-1 Firmware Simatic Net Cp 1543sp-1 Simatic Net Cp 1543sp-1 Firmware Simatic Rf185c Simatic Rf185c Firmware Simatic Rf186c Simatic Rf186c Firmware Simatic Rf186ci Simatic Rf186ci Firmware Simatic Rf188 Simatic Rf188 Firmware Simatic Rf188ci Simatic Rf188ci Firmware Sinema Remote Connect Server Sinema Remote Connect Server Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-05T05:33:44.368Z

Reserved: 2018-01-12T00:00:00.000Z

Link: CVE-2018-5391

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-09-06T21:29:00.363

Modified: 2024-11-21T04:08:43.897

Link: CVE-2018-5391

cve-icon Redhat

Severity : Important

Publid Date: 2018-08-14T16:00:00Z

Links: CVE-2018-5391 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses