Debian Bug report logs -
#905751
linux: CVE-2018-5390
Reported by: "Jamie" <darkshad9999@gmail.com>
Date: Wed, 8 Aug 2018 22:45:02 UTC
Severity: grave
Merged with 905966
Found in versions linux/4.9.110-1~deb8u1, linux/4.9~rc3-1~exp1
Fixed in versions linux/4.17.14-1, linux/4.9.110-3+deb9u1
Done: Salvatore Bonaccorso <carnil@debian.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, unknown-package@qa.debian.org
:
Bug#905751
; Package kernel
.
(Wed, 08 Aug 2018 22:45:05 GMT) (full text, mbox, link).
Acknowledgement sent
to "Jamie" <darkshad9999@gmail.com>
:
New Bug report received and forwarded. Copy sent to unknown-package@qa.debian.org
.
(Wed, 08 Aug 2018 22:45:05 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Package: Kernel
Version: 4.9+
Severity: Critical
So I was reading isc.sans.edu and came across this
That people are dubbing "segmentsmack"
https://isc.sans.edu/forums/diary/What+Do+I+Need+To+Know+about+SegmentSmack/
23964/
Which affects Linux Kernels 4.9+
https://www.kb.cert.org/vuls/id/962459
"The Linux kernel versions 4.9+ and supported versions of
FreeBSD are vulnerable to denial of service conditions with low
rates of specially modified packets."
Vulnerability Note VU#962459
TCP implementations vulnerable to Denial of Service
The Linux kernel versions 4.9+ and supported versions of FreeBSD are
vulnerable
to denial of service conditions with low rates of specially modified
packets.
Description
CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion') -
CVE-2018-5390
Linux kernel versions 4.9+ can be forced to make very expensive calls to
tcp_collapse_ofo_queue()
and tcp_prune_ofo_queue() for every incoming packet which can lead to a
denial of service.
CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion') -
CVE-2018-6922
A TCP data structure in supported versions of FreeBSD (11, 11.1, 11.2, 10,
and 10.4) use an
inefficient algorithm to reassemble the data.
Now it does say that Debian is susceptible to this bug as well.
"Debian GNU/Linux Affected 23 Jul 2018"
uname -a
Linux server1 4.9.0-6-amd64 #1 SMP Debian 4.9.88-1+deb9u1 (2018-05-07)
x86_64 GNU/Linux
As you can see I am on Debian 9.5 using a kernel version of 4.9.88-1+deb9u1
[Message part 2 (text/html, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, unknown-package@qa.debian.org
:
Bug#905751
; Package kernel
.
(Thu, 09 Aug 2018 04:39:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
Extra info received and forwarded to list. Copy sent to unknown-package@qa.debian.org
.
(Thu, 09 Aug 2018 04:39:03 GMT) (full text, mbox, link).
Message #10 received at 905751@bugs.debian.org (full text, mbox, reply):
Control: reassign 905751 src:linux 4.9~rc3-1~exp1
Control: retitle -1 linux: CVE-2018-5390
Control: severity -1 grave
Control: fixed -1 4.9.110-3+deb9u1
Hi,
On Wed, Aug 08, 2018 at 04:42:42PM -0600, Jamie wrote:
> Package: Kernel
>
> Version: 4.9+
>
> Severity: Critical
>
>
>
> So I was reading isc.sans.edu and came across this
>
> That people are dubbing "segmentsmack"
>
>
>
> https://isc.sans.edu/forums/diary/What+Do+I+Need+To+Know+about+SegmentSmack/
> 23964/
>
> Which affects Linux Kernels 4.9+
>
>
>
> https://www.kb.cert.org/vuls/id/962459
>
> "The Linux kernel versions 4.9+ and supported versions of
>
> FreeBSD are vulnerable to denial of service conditions with low
>
> rates of specially modified packets."
>
>
>
>
>
> Vulnerability Note VU#962459
>
> TCP implementations vulnerable to Denial of Service
>
>
>
> The Linux kernel versions 4.9+ and supported versions of FreeBSD are
> vulnerable
>
> to denial of service conditions with low rates of specially modified
> packets.
>
> Description
>
>
>
> CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion') -
> CVE-2018-5390
>
>
>
> Linux kernel versions 4.9+ can be forced to make very expensive calls to
> tcp_collapse_ofo_queue()
>
> and tcp_prune_ofo_queue() for every incoming packet which can lead to a
> denial of service.
>
>
>
> CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion') -
> CVE-2018-6922
>
> A TCP data structure in supported versions of FreeBSD (11, 11.1, 11.2, 10,
> and 10.4) use an
>
> inefficient algorithm to reassemble the data.
>
>
>
> Now it does say that Debian is susceptible to this bug as well.
>
>
>
> "Debian GNU/Linux Affected 23 Jul 2018"
>
>
>
> uname -a
>
> Linux server1 4.9.0-6-amd64 #1 SMP Debian 4.9.88-1+deb9u1 (2018-05-07)
> x86_64 GNU/Linux
>
>
>
> As you can see I am on Debian 9.5 using a kernel version of 4.9.88-1+deb9u1
It is already fixed for stable via DSA-4266-1
(https://www.debian.org/security/2018/dsa-4266).
Regards,
Salvatore
Bug reassigned from package 'kernel' to 'src:linux'.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to 905751-submit@bugs.debian.org
.
(Thu, 09 Aug 2018 04:39:03 GMT) (full text, mbox, link).
Marked as found in versions linux/4.9~rc3-1~exp1.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to 905751-submit@bugs.debian.org
.
(Thu, 09 Aug 2018 04:39:04 GMT) (full text, mbox, link).
Changed Bug title to 'linux: CVE-2018-5390' from 'SegmentSmack'.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to 905751-submit@bugs.debian.org
.
(Thu, 09 Aug 2018 04:39:05 GMT) (full text, mbox, link).
Severity set to 'grave' from 'normal'
Request was from Salvatore Bonaccorso <carnil@debian.org>
to 905751-submit@bugs.debian.org
.
(Thu, 09 Aug 2018 04:39:05 GMT) (full text, mbox, link).
Marked as fixed in versions linux/4.9.110-3+deb9u1.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to 905751-submit@bugs.debian.org
.
(Thu, 09 Aug 2018 04:39:06 GMT) (full text, mbox, link).
Marked Bug as done
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org
.
(Thu, 09 Aug 2018 04:45:03 GMT) (full text, mbox, link).
Notification sent
to "Jamie" <darkshad9999@gmail.com>
:
Bug acknowledged by developer.
(Thu, 09 Aug 2018 04:45:04 GMT) (full text, mbox, link).
Message sent on
to "Jamie" <darkshad9999@gmail.com>
:
Bug#905751.
(Thu, 09 Aug 2018 04:45:08 GMT) (full text, mbox, link).
Message #27 received at 905751-submitter@bugs.debian.org (full text, mbox, reply):
close 905751 4.9.110-3+deb9u1
thanks
Marked as found in versions linux/4.9.110-1~deb8u1.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org
.
(Sun, 12 Aug 2018 19:09:10 GMT) (full text, mbox, link).
Merged 905751 905966
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org
.
(Sun, 12 Aug 2018 19:09:13 GMT) (full text, mbox, link).
Marked as fixed in versions linux/4.17.14-1.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org
.
(Mon, 13 Aug 2018 13:48:05 GMT) (full text, mbox, link).
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org
.
(Fri, 23 Nov 2018 07:29:56 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Jun 19 15:20:00 2019;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.