The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2018-09-06 21:29
Updated : 2019-03-21 16:00
NVD link : CVE-2018-5391
Mitre link : CVE-2018-5391
JSON object : View
Products Affected
debian
- debian_linux
redhat
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_server_aus
- enterprise_linux_server_eus
canonical
- ubuntu_linux
linux
- linux_kernel
CWE
CWE-20
Improper Input Validation
