CVE-2018-5391

Priority
Description
The Linux kernel, versions 3.9+, is vulnerable to a denial of service
attack with low rates of specially modified packets targeting IP fragment
re-assembly. An attacker may cause a denial of service condition by sending
specially crafted IP fragments. Various vulnerabilities in IP fragmentation
have been discovered and fixed over the years. The current vulnerability
(CVE-2018-5391) became exploitable in the Linux kernel with the increase of
the IP fragment reassembly queue size.
Ubuntu-Description
Juha-Matti Tilli discovered that the IP implementation in the Linux kernel
performed algorithmically expensive operations in some situations when
handling incoming packet fragments. A remote attacker could use this to
cause a denial of service.
Notes
tyhicksCERT recommends reverting c2a936600f78aea00d3312ea4b66a79a4619f9b4
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:released (4.15.0-1019.19)
Ubuntu 16.04 ESM:released (4.4.0-1065.75)
Ubuntu 14.04 ESM:released (4.4.0-1027.30)
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:released (4.15.0-1021.21)
Ubuntu 16.04 ESM:released (4.15.0-1021.21~16.04.1)
Ubuntu 14.04 ESM:not-affected (4.15.0-1023.24~14.04.1)
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:not-affected (4.18.0-1004.4~18.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:released (4.15.0-1017.18)
Ubuntu 16.04 ESM:released (4.15.0-1017.18~16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:not-affected
Ubuntu 16.04 ESM:released (4.15.0-32.35~16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:not-affected (4.18.0-11.12~18.04.1)
Ubuntu 16.04 ESM:released (4.15.0-32.35~16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:released (4.15.0-1019.19)
Ubuntu 16.04 ESM:released (4.4.0-1031.37)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [out of standard support])
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [out of standard support])
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [out of standard support])
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:released (4.4.0-133.159~14.04.1)
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:released (4.15.0-1015.18)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:released (4.15.0-1020.22)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.19~rc4)
Ubuntu 18.04 LTS:not-affected
Ubuntu 14.04 ESM:DNE
Patches:
More Information

Updated: 2022-04-13 13:33:22 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)