Unrated severityNVD Advisory· Published Sep 6, 2018· Updated Aug 5, 2024
The Linux kernel, versions 3.9+, IP implementation is vulnerable to denial of service conditions with low rates of specially modified packets
CVE-2018-5391
Description
The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
Affected products
131- osv-coords130 versionspkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kernel-docs-azure&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012pkg:rpm/suse/kernel-livepatch-SLE15_Update_0&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015pkg:rpm/suse/kernel-livepatch-SLE15_Update_1&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015pkg:rpm/suse/kernel-livepatch-SLE15_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP3pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP3pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP3pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015pkg:rpm/suse/kernel-syms&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP3pkg:rpm/suse/kernel-vanilla&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_26&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_26&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_27&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_27&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_28&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_28&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_29&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_29&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_30&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_30&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_31&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_31&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_32&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_32&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_33&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_33&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_15&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_15&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_18&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_18&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_19&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_19&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_20&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_20&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_21&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_21&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_22&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_22&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_23&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_23&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_24&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_24&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_24&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_24&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_24&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_10&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_11&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_12&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_13&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_14&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_15&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_23&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_7&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_8&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_9&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12_Update_33&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_34&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_35&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_36&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_37&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_38&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/lttng-modules&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/lttng-modules&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015pkg:rpm/suse/lttng-modules&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/lttng-modules&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/lttng-modules&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/lttng-modules&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/lttng-modules&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/lttng-modules&distro=SUSE%20OpenStack%20Cloud%207
< 4.12.14-5.13.1+ 129 more
- (no CPE)range: < 4.12.14-5.13.1
- (no CPE)range: < 4.4.143-4.13.1
- (no CPE)range: < 4.4.143-4.13.1
- (no CPE)range: < 4.4.121-92.92.1
- (no CPE)range: < 4.4.175-94.79.1
- (no CPE)range: < 4.4.121-92.92.1
- (no CPE)range: < 4.4.175-94.79.1
- (no CPE)range: < 4.12.14-25.13.1
- (no CPE)range: < 4.12.14-25.13.1
- (no CPE)range: < 4.12.14-25.13.1
- (no CPE)range: < 4.12.14-25.13.1
- (no CPE)range: < 3.12.74-60.64.110.1
- (no CPE)range: < 4.4.121-92.92.1
- (no CPE)range: < 4.4.121-92.92.1
- (no CPE)range: < 4.4.175-94.79.1
- (no CPE)range: < 3.12.74-60.64.110.1
- (no CPE)range: < 4.4.121-92.92.1
- (no CPE)range: < 4.4.175-94.79.1
- (no CPE)range: < 4.4.175-94.79.1
- (no CPE)range: < 4.12.14-25.13.1
- (no CPE)range: < 4.4.121-92.92.1
- (no CPE)range: < 4.4.143-4.13.1
- (no CPE)range: < 4.12.14-25.13.1
- (no CPE)range: < 4.4.175-94.79.1
- (no CPE)range: < 3.12.74-60.64.110.1
- (no CPE)range: < 6-16.2
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 4.12.14-25.13.1
- (no CPE)range: < 4.4.175-94.79.1
- (no CPE)range: < 4.4.147-3.20.1
- (no CPE)range: < 4.4.147-3.20.1
- (no CPE)range: < 4.12.14-5.13.1
- (no CPE)range: < 4.4.143-4.13.1
- (no CPE)range: < 4.4.143-4.13.1
- (no CPE)range: < 4.4.121-92.92.1
- (no CPE)range: < 4.4.175-94.79.1
- (no CPE)range: < 4.12.14-25.13.1
- (no CPE)range: < 4.12.14-25.13.1
- (no CPE)range: < 3.12.74-60.64.110.1
- (no CPE)range: < 4.4.121-92.92.1
- (no CPE)range: < 4.4.121-92.92.1
- (no CPE)range: < 4.4.175-94.79.1
- (no CPE)range: < 3.12.74-60.64.110.1
- (no CPE)range: < 4.4.121-92.92.1
- (no CPE)range: < 4.4.175-94.79.1
- (no CPE)range: < 4.4.121-92.92.1
- (no CPE)range: < 4.4.147-3.20.1
- (no CPE)range: < 4.12.14-5.13.1
- (no CPE)range: < 4.4.121-92.92.1
- (no CPE)range: < 4.4.175-94.79.1
- (no CPE)range: < 4.12.14-25.13.1
- (no CPE)range: < 3.12.74-60.64.110.1
- (no CPE)range: < 4.4.121-92.92.1
- (no CPE)range: < 4.4.121-92.92.1
- (no CPE)range: < 4.4.175-94.79.1
- (no CPE)range: < 3.12.74-60.64.110.1
- (no CPE)range: < 4.4.121-92.92.1
- (no CPE)range: < 4.4.175-94.79.1
- (no CPE)range: < 4.4.121-92.92.1
- (no CPE)range: < 4.4.147-3.20.1
- (no CPE)range: < 4.12.14-25.13.1
- (no CPE)range: < 3.12.74-60.64.110.1
- (no CPE)range: < 3.12.74-60.64.110.1
- (no CPE)range: < 4.12.14-25.13.1
- (no CPE)range: < 12-2.1
- (no CPE)range: < 12-2.1
- (no CPE)range: < 10-2.1
- (no CPE)range: < 10-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 8-2.1
- (no CPE)range: < 8-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 1-2.3.1
- (no CPE)range: < 1-2.3.1
- (no CPE)range: < 12-2.1
- (no CPE)range: < 12-2.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 8-2.1
- (no CPE)range: < 8-2.1
- (no CPE)range: < 7-2.1
- (no CPE)range: < 7-2.1
- (no CPE)range: < 7-2.1
- (no CPE)range: < 7-2.1
- (no CPE)range: < 5-2.1
- (no CPE)range: < 5-2.1
- (no CPE)range: < 1-3.7.1
- (no CPE)range: < 1-3.7.1
- (no CPE)range: < 1-3.7.1
- (no CPE)range: < 1-3.7.1
- (no CPE)range: < 1-3.7.1
- (no CPE)range: < 8-2.1
- (no CPE)range: < 8-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 5-2.1
- (no CPE)range: < 5-2.1
- (no CPE)range: < 1-4.7.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 12-2.1
- (no CPE)range: < 10-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 8-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 2.7.1-9.4.1
- (no CPE)range: < 2.10.0-5.4.2
- (no CPE)range: < 2.7.0-4.4.1
- (no CPE)range: < 2.7.1-9.4.1
- (no CPE)range: < 2.7.1-9.4.1
- (no CPE)range: < 2.7.0-4.4.1
- (no CPE)range: < 2.7.1-9.4.1
- (no CPE)range: < 2.7.1-9.4.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
35- access.redhat.com/errata/RHSA-2018:2785mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:2791mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:2846mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:2924mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:2925mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:2933mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:2948mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:3083mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:3096mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:3459mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:3540mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:3586mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:3590mitrevendor-advisoryx_refsource_REDHAT
- usn.ubuntu.com/3740-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3740-2/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3741-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3741-2/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3742-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3742-2/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2018/dsa-4272mitrevendor-advisoryx_refsource_DEBIAN
- www.kb.cert.org/vuls/id/641765mitrethird-party-advisoryx_refsource_CERT-VN
- www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txtmitrex_refsource_CONFIRM
- www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-linux-enmitrex_refsource_CONFIRM
- www.openwall.com/lists/oss-security/2019/06/28/2mitremailing-listx_refsource_MLIST
- www.openwall.com/lists/oss-security/2019/07/06/3mitremailing-listx_refsource_MLIST
- www.openwall.com/lists/oss-security/2019/07/06/4mitremailing-listx_refsource_MLIST
- www.securityfocus.com/bid/105108mitrevdb-entryx_refsource_BID
- www.securitytracker.com/id/1041476mitrevdb-entryx_refsource_SECTRACK
- www.securitytracker.com/id/1041637mitrevdb-entryx_refsource_SECTRACK
- cert-portal.siemens.com/productcert/pdf/ssa-377115.pdfmitrex_refsource_CONFIRM
- git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/mitrex_refsource_MISC
- lists.debian.org/debian-lts-announce/2018/08/msg00014.htmlmitremailing-listx_refsource_MLIST
- lists.debian.org/debian-lts-announce/2019/03/msg00017.htmlmitremailing-listx_refsource_MLIST
- security.netapp.com/advisory/ntap-20181003-0002/mitrex_refsource_CONFIRM
- support.f5.com/csp/article/K74374841mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.