The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Big-ip Access Policy Manager Subscribe
Big-ip Advanced Firewall Manager Subscribe
Big-ip Analytics Subscribe
Big-ip Application Acceleration Manager Subscribe
Big-ip Application Security Manager Subscribe
Big-ip Domain Name System Subscribe
Big-ip Edge Gateway Subscribe
Big-ip Fraud Protection Service Subscribe
Big-ip Global Traffic Manager Subscribe
Big-ip Link Controller Subscribe
Big-ip Local Traffic Manager Subscribe
Big-ip Policy Enforcement Manager Subscribe
Big-ip Webaccelerator Subscribe
Linux Kernel Subscribe
Microsoft Subscribe
Windows 10 Subscribe
Windows 7 Subscribe
Windows 8.1 Subscribe
Windows Rt 8.1 Subscribe
Windows Server 2008 Subscribe
Windows Server 2012 Subscribe
Windows Server 2016 Subscribe
Enterprise Linux Subscribe
Enterprise Linux Desktop Subscribe
Enterprise Linux Server Subscribe
Enterprise Linux Server Aus Subscribe
Enterprise Linux Server Eus Subscribe
Enterprise Linux Server Tus Subscribe
Enterprise Linux Workstation Subscribe
Enterprise Mrg Subscribe
Rhel Aus Subscribe
Rhel E4s Subscribe
Rhel Eus Subscribe
Rhel Extras Rt Subscribe
Rhel Tus Subscribe
Siemens Subscribe
Ruggedcom Rm1224 Subscribe
Ruggedcom Rm1224 Firmware Subscribe
Ruggedcom Rox Ii Subscribe
Ruggedcom Rox Ii Firmware Subscribe
Scalance M-800 Subscribe
Scalance M-800 Firmware Subscribe
Scalance S615 Subscribe
Scalance S615 Firmware Subscribe
Scalance Sc-600 Subscribe
Scalance Sc-600 Firmware Subscribe
Scalance W1700 Ieee 802.11ac Subscribe
Scalance W1700 Ieee 802.11ac Firmware Subscribe
Scalance W700 Ieee 802.11a\/b\/g\/n Subscribe
Scalance W700 Ieee 802.11a\/b\/g\/n Firmware Subscribe
Simatic Net Cp 1242-7 Subscribe
Simatic Net Cp 1242-7 Firmware Subscribe
Simatic Net Cp 1243-1 Subscribe
Simatic Net Cp 1243-1 Firmware Subscribe
Simatic Net Cp 1243-7 Lte Eu Subscribe
Simatic Net Cp 1243-7 Lte Eu Firmware Subscribe
Simatic Net Cp 1243-7 Lte Us Subscribe
Simatic Net Cp 1243-7 Lte Us Firmware Subscribe
Simatic Net Cp 1243-8 Irc Subscribe
Simatic Net Cp 1243-8 Irc Firmware Subscribe
Simatic Net Cp 1542sp-1 Subscribe
Simatic Net Cp 1542sp-1 Firmware Subscribe
Simatic Net Cp 1542sp-1 Irc Subscribe
Simatic Net Cp 1542sp-1 Irc Firmware Subscribe
Simatic Net Cp 1543-1 Subscribe
Simatic Net Cp 1543-1 Firmware Subscribe
Simatic Net Cp 1543sp-1 Subscribe
Simatic Net Cp 1543sp-1 Firmware Subscribe
Simatic Rf185c Subscribe
Simatic Rf185c Firmware Subscribe
Simatic Rf186c Subscribe
Simatic Rf186c Firmware Subscribe
Simatic Rf186ci Subscribe
Simatic Rf186ci Firmware Subscribe
Simatic Rf188 Subscribe
Simatic Rf188 Firmware Subscribe
Simatic Rf188ci Subscribe
Simatic Rf188ci Firmware Subscribe
Sinema Remote Connect Server Subscribe
Sinema Remote Connect Server Firmware Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1466-1 linux-4.9 security update
Debian DLA Debian DLA DLA-1715-1 linux-4.9 security update
Debian DSA Debian DSA DSA-4272-1 linux security update
EUVD EUVD EUVD-2018-17161 The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
Ubuntu USN Ubuntu USN USN-3740-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3740-2 Linux kernel (HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3741-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3741-2 Linux kernel (Xenial HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3742-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3742-2 Linux kernel (Trusty HWE) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt cve-icon cve-icon
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-linux-en cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/06/28/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/07/06/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/07/06/4 cve-icon cve-icon
http://www.securityfocus.com/bid/105108 cve-icon cve-icon
http://www.securitytracker.com/id/1041476 cve-icon cve-icon
http://www.securitytracker.com/id/1041637 cve-icon cve-icon
https://access.redhat.com/articles/3553061 cve-icon
https://access.redhat.com/errata/RHSA-2018:2785 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2791 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2846 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2924 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2925 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2933 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2948 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3083 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3096 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3459 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3540 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3586 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3590 cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=c30f1fc041b74ecdb072dd44f858750414b8b19f cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2018-5391 cve-icon
https://security.netapp.com/advisory/ntap-20181003-0002/ cve-icon cve-icon
https://support.f5.com/csp/article/K74374841?utm_source=f5support&amp%3Butm_medium=RSS cve-icon cve-icon
https://usn.ubuntu.com/3740-1/ cve-icon cve-icon
https://usn.ubuntu.com/3740-2/ cve-icon cve-icon
https://usn.ubuntu.com/3741-1/ cve-icon cve-icon
https://usn.ubuntu.com/3741-2/ cve-icon cve-icon
https://usn.ubuntu.com/3742-1/ cve-icon cve-icon
https://usn.ubuntu.com/3742-2/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2018-5391 cve-icon
https://www.debian.org/security/2018/dsa-4272 cve-icon cve-icon
https://www.kb.cert.org/vuls/id/641765 cve-icon cve-icon cve-icon
History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01637}

epss

{'score': 0.01732}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-08-05T05:33:44.368Z

Reserved: 2018-01-12T00:00:00.000Z

Link: CVE-2018-5391

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-09-06T21:29:00.363

Modified: 2024-11-21T04:08:43.897

Link: CVE-2018-5391

cve-icon Redhat

Severity : Important

Publid Date: 2018-08-14T16:00:00Z

Links: CVE-2018-5391 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses