vulnerability
Ubuntu: (Multiple Advisories) (CVE-2018-5391): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Aug 14, 2018 | Aug 18, 2018 | Aug 18, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Aug 14, 2018
Added
Aug 18, 2018
Modified
Aug 18, 2025
Description
The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
Solutions
ubuntu-upgrade-linux-image-3-13-0-155-genericubuntu-upgrade-linux-image-3-13-0-155-generic-lpaeubuntu-upgrade-linux-image-3-13-0-155-lowlatencyubuntu-upgrade-linux-image-3-13-0-155-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-155-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-155-powerpc-smpubuntu-upgrade-linux-image-3-13-0-155-powerpc64-embubuntu-upgrade-linux-image-3-13-0-155-powerpc64-smpubuntu-upgrade-linux-image-4-15-0-1015-oemubuntu-upgrade-linux-image-4-15-0-1017-gcpubuntu-upgrade-linux-image-4-15-0-1019-awsubuntu-upgrade-linux-image-4-15-0-1019-kvmubuntu-upgrade-linux-image-4-15-0-1020-raspi2ubuntu-upgrade-linux-image-4-15-0-1021-azureubuntu-upgrade-linux-image-4-15-0-32-genericubuntu-upgrade-linux-image-4-15-0-32-generic-lpaeubuntu-upgrade-linux-image-4-15-0-32-lowlatencyubuntu-upgrade-linux-image-4-15-0-32-snapdragonubuntu-upgrade-linux-image-4-4-0-1027-awsubuntu-upgrade-linux-image-4-4-0-1031-kvmubuntu-upgrade-linux-image-4-4-0-1065-awsubuntu-upgrade-linux-image-4-4-0-1094-raspi2ubuntu-upgrade-linux-image-4-4-0-1098-snapdragonubuntu-upgrade-linux-image-4-4-0-133-genericubuntu-upgrade-linux-image-4-4-0-133-generic-lpaeubuntu-upgrade-linux-image-4-4-0-133-lowlatencyubuntu-upgrade-linux-image-4-4-0-133-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-133-powerpc-smpubuntu-upgrade-linux-image-4-4-0-133-powerpc64-embubuntu-upgrade-linux-image-4-4-0-133-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-edgeubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtual-hwe-16-04
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.