linux: CVE-2018-5390

Related Vulnerabilities: CVE-2018-5390   CVE-2018-6922  

Debian Bug report logs - #905751
linux: CVE-2018-5390

version graph

Reported by: "Jamie" <darkshad9999@gmail.com>

Date: Wed, 8 Aug 2018 22:45:02 UTC

Severity: grave

Merged with 905966

Found in versions linux/4.9.110-1~deb8u1, linux/4.9~rc3-1~exp1

Fixed in versions linux/4.17.14-1, linux/4.9.110-3+deb9u1

Done: Salvatore Bonaccorso <carnil@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, unknown-package@qa.debian.org:
Bug#905751; Package kernel. (Wed, 08 Aug 2018 22:45:05 GMT) (full text, mbox, link).


Acknowledgement sent to "Jamie" <darkshad9999@gmail.com>:
New Bug report received and forwarded. Copy sent to unknown-package@qa.debian.org. (Wed, 08 Aug 2018 22:45:05 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: "Jamie" <darkshad9999@gmail.com>
To: <submit@bugs.debian.org>
Subject: SegmentSmack
Date: Wed, 8 Aug 2018 16:42:42 -0600
[Message part 1 (text/plain, inline)]
Package: Kernel

Version: 4.9+

Severity: Critical

 

So I was reading isc.sans.edu and came across this 

That people are dubbing "segmentsmack" 

 

https://isc.sans.edu/forums/diary/What+Do+I+Need+To+Know+about+SegmentSmack/
23964/

Which affects  Linux Kernels 4.9+ 

 

https://www.kb.cert.org/vuls/id/962459

"The Linux kernel versions 4.9+ and supported versions of 

FreeBSD are vulnerable to denial  of service conditions with low 

rates of specially modified packets."

 

 

Vulnerability Note VU#962459

TCP implementations vulnerable to Denial of Service

 

The Linux kernel versions 4.9+ and supported versions of FreeBSD are
vulnerable 

to denial of service conditions with low rates of specially modified
packets.

Description

 

CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion') -
CVE-2018-5390

 

Linux kernel versions 4.9+ can be forced to make very expensive calls to
tcp_collapse_ofo_queue() 

and tcp_prune_ofo_queue() for every incoming packet which can lead to a
denial of service.

 

CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion') -
CVE-2018-6922

A TCP data structure in supported versions of FreeBSD (11, 11.1, 11.2, 10,
and 10.4) use an 

inefficient algorithm to reassemble the data.

 

Now it does say that Debian is susceptible to this bug as well.

 

"Debian GNU/Linux        Affected              23 Jul 2018"

 

uname -a

Linux server1 4.9.0-6-amd64 #1 SMP Debian 4.9.88-1+deb9u1 (2018-05-07)
x86_64 GNU/Linux

 

As you can see I am on Debian 9.5 using a kernel version of 4.9.88-1+deb9u1

 

 

 

[Message part 2 (text/html, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, unknown-package@qa.debian.org:
Bug#905751; Package kernel. (Thu, 09 Aug 2018 04:39:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to unknown-package@qa.debian.org. (Thu, 09 Aug 2018 04:39:03 GMT) (full text, mbox, link).


Message #10 received at 905751@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Jamie <darkshad9999@gmail.com>, 905751@bugs.debian.org
Subject: Re: Bug#905751: SegmentSmack
Date: Thu, 9 Aug 2018 06:36:47 +0200
Control: reassign 905751 src:linux 4.9~rc3-1~exp1
Control: retitle -1 linux: CVE-2018-5390
Control: severity -1 grave
Control: fixed -1 4.9.110-3+deb9u1

Hi,

On Wed, Aug 08, 2018 at 04:42:42PM -0600, Jamie wrote:
> Package: Kernel
> 
> Version: 4.9+
> 
> Severity: Critical
> 
>  
> 
> So I was reading isc.sans.edu and came across this 
> 
> That people are dubbing "segmentsmack" 
> 
>  
> 
> https://isc.sans.edu/forums/diary/What+Do+I+Need+To+Know+about+SegmentSmack/
> 23964/
> 
> Which affects  Linux Kernels 4.9+ 
> 
>  
> 
> https://www.kb.cert.org/vuls/id/962459
> 
> "The Linux kernel versions 4.9+ and supported versions of 
> 
> FreeBSD are vulnerable to denial  of service conditions with low 
> 
> rates of specially modified packets."
> 
>  
> 
>  
> 
> Vulnerability Note VU#962459
> 
> TCP implementations vulnerable to Denial of Service
> 
>  
> 
> The Linux kernel versions 4.9+ and supported versions of FreeBSD are
> vulnerable 
> 
> to denial of service conditions with low rates of specially modified
> packets.
> 
> Description
> 
>  
> 
> CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion') -
> CVE-2018-5390
> 
>  
> 
> Linux kernel versions 4.9+ can be forced to make very expensive calls to
> tcp_collapse_ofo_queue() 
> 
> and tcp_prune_ofo_queue() for every incoming packet which can lead to a
> denial of service.
> 
>  
> 
> CWE-400: Uncontrolled Resource Consumption ('Resource Exhaustion') -
> CVE-2018-6922
> 
> A TCP data structure in supported versions of FreeBSD (11, 11.1, 11.2, 10,
> and 10.4) use an 
> 
> inefficient algorithm to reassemble the data.
> 
>  
> 
> Now it does say that Debian is susceptible to this bug as well.
> 
>  
> 
> "Debian GNU/Linux        Affected              23 Jul 2018"
> 
>  
> 
> uname -a
> 
> Linux server1 4.9.0-6-amd64 #1 SMP Debian 4.9.88-1+deb9u1 (2018-05-07)
> x86_64 GNU/Linux
> 
>  
> 
> As you can see I am on Debian 9.5 using a kernel version of 4.9.88-1+deb9u1

It is already fixed for stable via DSA-4266-1
(https://www.debian.org/security/2018/dsa-4266).

Regards,
Salvatore



Bug reassigned from package 'kernel' to 'src:linux'. Request was from Salvatore Bonaccorso <carnil@debian.org> to 905751-submit@bugs.debian.org. (Thu, 09 Aug 2018 04:39:03 GMT) (full text, mbox, link).


Marked as found in versions linux/4.9~rc3-1~exp1. Request was from Salvatore Bonaccorso <carnil@debian.org> to 905751-submit@bugs.debian.org. (Thu, 09 Aug 2018 04:39:04 GMT) (full text, mbox, link).


Changed Bug title to 'linux: CVE-2018-5390' from 'SegmentSmack'. Request was from Salvatore Bonaccorso <carnil@debian.org> to 905751-submit@bugs.debian.org. (Thu, 09 Aug 2018 04:39:05 GMT) (full text, mbox, link).


Severity set to 'grave' from 'normal' Request was from Salvatore Bonaccorso <carnil@debian.org> to 905751-submit@bugs.debian.org. (Thu, 09 Aug 2018 04:39:05 GMT) (full text, mbox, link).


Marked as fixed in versions linux/4.9.110-3+deb9u1. Request was from Salvatore Bonaccorso <carnil@debian.org> to 905751-submit@bugs.debian.org. (Thu, 09 Aug 2018 04:39:06 GMT) (full text, mbox, link).


Marked Bug as done Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 09 Aug 2018 04:45:03 GMT) (full text, mbox, link).


Notification sent to "Jamie" <darkshad9999@gmail.com>:
Bug acknowledged by developer. (Thu, 09 Aug 2018 04:45:04 GMT) (full text, mbox, link).


Message sent on to "Jamie" <darkshad9999@gmail.com>:
Bug#905751. (Thu, 09 Aug 2018 04:45:08 GMT) (full text, mbox, link).


Message #27 received at 905751-submitter@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: control@bugs.debian.org
Cc: 905751-submitter@bugs.debian.org
Subject: closing 905751
Date: Thu, 09 Aug 2018 06:41:26 +0200
close 905751 4.9.110-3+deb9u1
thanks




Marked as found in versions linux/4.9.110-1~deb8u1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 12 Aug 2018 19:09:10 GMT) (full text, mbox, link).


Merged 905751 905966 Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 12 Aug 2018 19:09:13 GMT) (full text, mbox, link).


Marked as fixed in versions linux/4.17.14-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Mon, 13 Aug 2018 13:48:05 GMT) (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Fri, 23 Nov 2018 07:29:56 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 15:20:00 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.