CVE编号
CVE-2018-5391利用情况
暂无补丁情况
官方补丁披露时间
2018-09-07漏洞描述
3.9+版的Linux内核容易受到拒绝服务攻击,因为针对IP片段重组的特殊修改数据包的传输率较低。攻击者可能通过发送特制IP片段来导致拒绝服务条件。这些年来,已经发现并修复了IP碎片中的各种漏洞。随着IP片段重组队列大小的增加,当前漏洞(CVE-2018-5391)在Linux内核中变得可利用。解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=c30f1fc041b74ecdb072dd44f858750414b8b19f
参考链接 |
|
---|---|
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt | |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-linux-en | |
http://www.openwall.com/lists/oss-security/2019/06/28/2 | |
http://www.openwall.com/lists/oss-security/2019/07/06/3 | |
http://www.openwall.com/lists/oss-security/2019/07/06/4 | |
http://www.securityfocus.com/bid/105108 | |
http://www.securitytracker.com/id/1041476 | |
http://www.securitytracker.com/id/1041637 | |
https://access.redhat.com/errata/RHSA-2018:2785 | |
https://access.redhat.com/errata/RHSA-2018:2791 | |
https://access.redhat.com/errata/RHSA-2018:2846 | |
https://access.redhat.com/errata/RHSA-2018:2924 | |
https://access.redhat.com/errata/RHSA-2018:2925 | |
https://access.redhat.com/errata/RHSA-2018:2933 | |
https://access.redhat.com/errata/RHSA-2018:2948 | |
https://access.redhat.com/errata/RHSA-2018:3083 | |
https://access.redhat.com/errata/RHSA-2018:3096 | |
https://access.redhat.com/errata/RHSA-2018:3459 | |
https://access.redhat.com/errata/RHSA-2018:3540 | |
https://access.redhat.com/errata/RHSA-2018:3586 | |
https://access.redhat.com/errata/RHSA-2018:3590 | |
https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf | |
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id... | |
https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html | |
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html | |
https://security.netapp.com/advisory/ntap-20181003-0002/ | |
https://support.f5.com/csp/article/K74374841?utm_source=f5support&utm_medium=RSS | |
https://usn.ubuntu.com/3740-1/ | |
https://usn.ubuntu.com/3740-2/ | |
https://usn.ubuntu.com/3741-1/ | |
https://usn.ubuntu.com/3741-2/ | |
https://usn.ubuntu.com/3742-1/ | |
https://usn.ubuntu.com/3742-2/ | |
https://www.debian.org/security/2018/dsa-4272 | |
https://www.kb.cert.org/vuls/id/641765 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 12.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 14.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 16.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 18.04 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | debian_linux | 8.0 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | debian_linux | 9.0 | - | |||||
运行在以下环境 | |||||||||
系统 | linux | linux_kernel | * |
From (including) 3.9 |
Up to (including) 4.18 |
||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_desktop | 6.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_desktop | 7.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server | 6.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server | 7.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_aus | 6.4 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_aus | 6.5 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_aus | 6.6 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_aus | 7.2 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_aus | 7.3 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_aus | 7.4 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_eus | 6.7 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_eus | 7.3 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_eus | 7.4 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_eus | 7.5 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_tus | 6.6 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_tus | 7.2 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_tus | 7.3 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_server_tus | 7.4 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_workstation | 6.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat | enterprise_linux_workstation | 7.0 | - | |||||
运行在以下环境 | |||||||||
系统 | redhat_6 | kernel | * |
Up to (excluding) 0:2.6.32-754.6.3.el6 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_7 | bpftool | * |
Up to (excluding) 0:3.10.0-957.el7 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_7 | kernel-rt | * |
Up to (excluding) 0:3.10.0-957.rt56.910.el7 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12 | kernel-default-extra | * |
Up to (excluding) 4.12.14-94.41 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04_lts | linux | * |
Up to (excluding) 3.13.0-155.205 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04_lts | linux | * |
Up to (excluding) 4.4.0-133.159 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04_lts | linux | * |
Up to (excluding) 4.15.0-32.35 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.10 | linux | * |
Up to (excluding) 4.18.0-9.10 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...