First published: Tue Jul 17 2018(Updated: )
A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.3.5.el6 | 0:2.6.32-754.3.5.el6 |
redhat/kernel | <0:2.6.32-358.93.1.el6 | 0:2.6.32-358.93.1.el6 |
redhat/kernel | <0:2.6.32-431.93.2.el6 | 0:2.6.32-431.93.2.el6 |
redhat/kernel | <0:2.6.32-504.76.2.el6 | 0:2.6.32-504.76.2.el6 |
redhat/kernel | <0:2.6.32-573.62.1.el6 | 0:2.6.32-573.62.1.el6 |
redhat/kernel-rt | <0:3.10.0-862.11.6.rt56.819.el7 | 0:3.10.0-862.11.6.rt56.819.el7 |
redhat/kernel | <0:3.10.0-862.11.6.el7 | 0:3.10.0-862.11.6.el7 |
redhat/kernel-alt | <0:4.14.0-115.el7a | 0:4.14.0-115.el7a |
redhat/kernel | <0:3.10.0-327.73.1.el7 | 0:3.10.0-327.73.1.el7 |
redhat/kernel | <0:3.10.0-514.58.1.el7 | 0:3.10.0-514.58.1.el7 |
redhat/kernel | <0:3.10.0-693.39.1.el7 | 0:3.10.0-693.39.1.el7 |
redhat/kernel-rt | <1:3.10.0-693.39.1.rt56.629.el6 | 1:3.10.0-693.39.1.rt56.629.el6 |
redhat/redhat-release-virtualization-host | <0:4.2-5.2.el7 | 0:4.2-5.2.el7 |
Red Hat Enterprise Virtualization | =4.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =6.4 | |
redhat enterprise Linux server aus | =6.5 | |
redhat enterprise Linux server aus | =6.6 | |
redhat enterprise Linux server aus | =7.2 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server eus | =6.4 | |
redhat enterprise Linux server eus | =6.7 | |
redhat enterprise Linux server eus | =7.2 | |
redhat enterprise Linux server eus | =7.3 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server tus | =6.6 | |
redhat enterprise Linux server tus | =7.2 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.4 | |
redhat enterprise Linux workstation | =7.0 | |
Linux Kernel | >=4.9<4.18 | |
Linux Kernel | =4.18-rc1 | |
Linux Kernel | =4.18-rc2 | |
Linux Kernel | =4.18-rc3 | |
Linux Kernel | =4.18-rc4 | |
Linux Kernel | =4.18-rc5 | |
Linux Kernel | =4.18-rc6 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
HPE Aruba AirWave AMP | <8.2.7.1 | |
HPE Aruba Networking ClearPass Policy Manager | >=6.6.0<=6.6.9 | |
HPE Aruba Networking ClearPass Policy Manager | >=6.7.0<=6.7.5 | |
F5 BIG-IP Access Policy Manager | >=11.5.1<=11.6.3 | |
F5 BIG-IP Access Policy Manager | >=12.1.0<=12.1.3 | |
F5 BIG-IP Access Policy Manager | >=13.0.0<=13.1.1 | |
F5 BIG-IP Access Policy Manager | =14.0.0 | |
F5 BIG-IP Advanced Firewall Manager | >=11.5.1<=11.6.3 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.3 | |
F5 BIG-IP Advanced Firewall Manager | >=13.0.0<=13.1.1 | |
F5 BIG-IP Advanced Firewall Manager | =14.0.0 | |
F5 BIG-IP Analytics | >=11.5.1<=11.6.3 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.3 | |
F5 BIG-IP Analytics | >=13.0.0<=13.1.1 | |
F5 BIG-IP Analytics | =14.0.0 | |
f5 big-ip application acceleration manager | >=11.5.1<=11.6.3 | |
f5 big-ip application acceleration manager | >=12.1.0<=12.1.3 | |
f5 big-ip application acceleration manager | >=13.0.0<=13.1.1 | |
f5 big-ip application acceleration manager | =14.0.0 | |
F5 BIG-IP Application Security Manager | >=11.5.1<=11.6.3 | |
F5 BIG-IP Application Security Manager | >=12.1.0<=12.1.3 | |
F5 BIG-IP Application Security Manager | >=13.0.0<=13.1.1 | |
F5 BIG-IP Application Security Manager | =14.0.0 | |
f5 big-ip domain name system | >=11.5.1<=11.6.3 | |
f5 big-ip domain name system | >=12.1.0<=12.1.3 | |
f5 big-ip domain name system | >=13.0.0<=13.1.1 | |
f5 big-ip domain name system | =14.0.0 | |
F5 BIG-IP Edge Gateway | >=11.5.1.<=11.6.3 | |
F5 BIG-IP Edge Gateway | >=12.1.0<=12.1.3 | |
F5 BIG-IP Edge Gateway | >=13.0.0<=13.1.1 | |
F5 BIG-IP Edge Gateway | =14.0.0 | |
f5 big-ip fraud protection service | >=11.5.1<=11.6.3 | |
f5 big-ip fraud protection service | >=12.1.0<=12.1.3 | |
f5 big-ip fraud protection service | >=13.0.0<=13.1.1 | |
f5 big-ip fraud protection service | =14.0.0 | |
F5 BIG-IP Global Traffic Manager | >=11.5.1<=11.6.3 | |
F5 BIG-IP Global Traffic Manager | >=12.1.0<=12.1.3 | |
F5 BIG-IP Global Traffic Manager | >=13.0.0<=13.1.1 | |
F5 BIG-IP Global Traffic Manager | =14.0.0 | |
f5 big-ip link controller | >=11.5.1<=11.6.3 | |
f5 big-ip link controller | >=12.1.0<=12.1.3 | |
f5 big-ip link controller | >=13.0.0<=13.1.1 | |
f5 big-ip link controller | =14.0.0 | |
F5 BIG-IP Local Traffic Manager | >=11.5.1<=11.6.3 | |
F5 BIG-IP Local Traffic Manager | >=12.0.0<=12.1.3 | |
F5 BIG-IP Local Traffic Manager | >13.0.0<=13.1.1 | |
F5 BIG-IP Local Traffic Manager | =14.0.0 | |
F5 BIG-IP Policy Enforcement Manager | >=11.5.1<=11.6.3 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<=12.1.3 | |
F5 BIG-IP Policy Enforcement Manager | >=13.0.0<=13.1.1 | |
F5 BIG-IP Policy Enforcement Manager | =14.0.0 | |
F5 BIG-IP WebAccelerator | >=11.5.1<=11.6.3 | |
F5 BIG-IP WebAccelerator | >=12.1.0<=12.1.3 | |
F5 BIG-IP WebAccelerator | >=13.0.0<=13.1.1 | |
F5 BIG-IP WebAccelerator | =14.0.0 | |
F5 Traffix Systems Signaling Delivery Controller | >=5.0.0<=5.1.0 | |
F5 Traffix Systems Signaling Delivery Controller | =4.4.0 | |
A10 Networks Advanced Core Operating System | =3.2.2 | |
A10 Networks Advanced Core Operating System | =3.2.2-p5 | |
A10 Networks Advanced Core Operating System | =4.1.0 | |
A10 Networks Advanced Core Operating System | =4.1.0-p11 | |
A10 Networks Advanced Core Operating System | =4.1.1-p8 | |
A10 Networks Advanced Core Operating System | =4.1.2 | |
A10 Networks Advanced Core Operating System | =4.1.2-p4 | |
A10 Networks Advanced Core Operating System | =4.1.4 | |
A10 Networks Advanced Core Operating System | =4.1.4-p1 | |
Cisco Collaboration Meeting Rooms | =1.0 | |
Cisco DNA Center | =1.2 | |
Cisco Expressway-C | =x8.10 | |
Cisco Expressway-C | =x8.10.1 | |
Cisco Expressway-C | =x8.10.2 | |
Cisco Expressway-C | =x8.10.3 | |
Cisco Expressway-C | =x8.10.4 | |
Cisco Expressway-C | =x8.11 | |
Cisco Expressway | ||
Cisco Meeting Management | =1.0 | |
Cisco Meeting Management | =1.0.1 | |
Cisco Network Assurance Engine | =2.1\(1a\) | |
Cisco Threat Grid-Cloud | ||
Cisco Webex Hybrid Data Security | ||
Cisco Webex Video Mesh | ||
All of | ||
Any of | ||
Cisco TelePresence Video Communication Server | =x8.10 | |
Cisco TelePresence Video Communication Server | =x8.10.1 | |
Cisco TelePresence Video Communication Server | =x8.10.2 | |
Cisco TelePresence Video Communication Server | =x8.10.3 | |
Cisco TelePresence Video Communication Server | =x8.10.4 | |
Cisco TelePresence Video Communication Server | =x8.11 | |
Cisco TelePresence Video Communication Server Firmware | ||
All of | ||
Any of | ||
Cisco TelePresence Conductor Firmware | =xc4.3 | |
Cisco TelePresence Conductor Firmware | =xc4.3.1 | |
Cisco TelePresence Conductor Firmware | =xc4.3.2 | |
Cisco TelePresence Conductor Firmware | =xc4.3.3 | |
Cisco TelePresence Conductor Firmware | =xc4.3.4 | |
Cisco TelePresence Conductor Firmware | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Debian | =8.0 | |
Debian | =9.0 | |
F5 Access Policy Manager | >=11.5.1<=11.6.3 | |
F5 Access Policy Manager | >=12.1.0<=12.1.3 | |
F5 Access Policy Manager | >=13.0.0<=13.1.1 | |
F5 Access Policy Manager | =14.0.0 | |
F5 Application Security Manager | >=11.5.1<=11.6.3 | |
F5 Application Security Manager | >=12.1.0<=12.1.3 | |
F5 Application Security Manager | >=13.0.0<=13.1.1 | |
F5 Application Security Manager | =14.0.0 | |
F5 BIG-IP fraud protection services | >=11.5.1<=11.6.3 | |
F5 BIG-IP fraud protection services | >=12.1.0<=12.1.3 | |
F5 BIG-IP fraud protection services | >=13.0.0<=13.1.1 | |
F5 BIG-IP fraud protection services | =14.0.0 | |
F5 BIG-IP | >=11.5.1<=11.6.3 | |
F5 BIG-IP | >=12.1.0<=12.1.3 | |
F5 BIG-IP | >=13.0.0<=13.1.1 | |
F5 BIG-IP | =14.0.0 | |
Cisco AMP Threat Grid | ||
Cisco Webex Video Mesh Software | ||
Cisco TelePresence Video Communication Server | =x8.10 | |
Cisco TelePresence Video Communication Server | =x8.10.1 | |
Cisco TelePresence Video Communication Server | =x8.10.2 | |
Cisco TelePresence Video Communication Server | =x8.10.3 | |
Cisco TelePresence Video Communication Server | =x8.10.4 | |
Cisco TelePresence Video Communication Server | =x8.11 | |
Cisco TelePresence Video Communication Server Firmware | ||
Cisco TelePresence Conductor Firmware | =xc4.3 | |
Cisco TelePresence Conductor Firmware | =xc4.3.1 | |
Cisco TelePresence Conductor Firmware | =xc4.3.2 | |
Cisco TelePresence Conductor Firmware | =xc4.3.3 | |
Cisco TelePresence Conductor Firmware | =xc4.3.4 | |
Cisco TelePresence Conductor Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2018-5390 has been classified with a CVSS score indicating a high severity, as it allows attackers to potentially impact system performance.
To fix CVE-2018-5390, apply the appropriate kernel updates provided by your Linux distribution, specifically versions listed in the vulnerability advisory.
CVE-2018-5390 affects specific versions of the Linux kernel, including Red Hat and Debian distributions as well as various Linux-based systems.
Exploiting CVE-2018-5390 could lead to denial-of-service conditions on affected systems due to excessive resource consumption.
Yes, CVE-2018-5390 has known exploit methods that enable attackers to craft malicious TCP packets to exploit the vulnerability.