CVE-2018-14641
Published: 18 September 2018
A security flaw was found in the ip_frag_reasm() function in net/ipv4/ip_fragment.c in the Linux kernel from 4.19-rc1 to 4.19-rc3 inclusive, which can cause a later system crash in ip_do_fragment(). With certain non-default, but non-rare, configuration of a victim host, an attacker can trigger this crash remotely, thus leading to a remote denial-of-service.
Notes
Author | Note |
---|---|
sbeattie | this vulnerability is a result of the fix for CVE-2018-5391/FragmentSmack; however, an alternative fix for CVE-2018-5391 was to revert c2a936600f78aea00d3312ea4b66a79a4619f9b4, which is what the Ubuntu kernels used. |
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
trusty |
Not vulnerable
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Not vulnerable
|
|
Patches: Introduced by fa0f527358bd900ef92f925878ed6bfbd51305cc |
||
linux-aws Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
trusty |
Not vulnerable
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Not vulnerable
|
|
linux-azure Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
trusty |
Not vulnerable
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Not vulnerable
|
|
linux-azure-edge Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Not vulnerable
|
|
linux-euclid Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Not vulnerable
|
|
linux-flo Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Ignored
(abandoned)
|
|
linux-gcp Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Not vulnerable
|
|
linux-gke Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Ignored
(end of standard support)
|
|
linux-goldfish Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Ignored
(end of life)
|
|
linux-grouper Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Does not exist
|
|
linux-hwe Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Not vulnerable
|
|
linux-hwe-edge Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Not vulnerable
|
|
linux-kvm Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Not vulnerable
|
|
linux-lts-trusty Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Does not exist
|
|
linux-lts-utopic Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [end of standard support])
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Does not exist
|
|
linux-lts-vivid Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [end of standard support])
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Does not exist
|
|
linux-lts-wily Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [end of standard support])
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Does not exist
|
|
linux-lts-xenial Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
trusty |
Not vulnerable
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Does not exist
|
|
linux-maguro Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Does not exist
|
|
linux-mako Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Ignored
(abandoned)
|
|
linux-manta Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Does not exist
|
|
linux-oem Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Not vulnerable
|
|
linux-raspi2 Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Not vulnerable
|
|
linux-snapdragon Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc4)
|
|
xenial |
Not vulnerable
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |