{
  "threat_severity" : "Important",
  "public_date" : "2018-08-06T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)",
    "id" : "1601704",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1601704"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-400",
  "details" : [ "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses." ],
  "statement" : "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
  "acknowledgement" : "Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2018-08-14T00:00:00Z",
    "advisory" : "RHSA-2018:2390",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "kernel-0:2.6.32-754.3.5.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.4 Advanced Update Support",
    "release_date" : "2018-09-25T00:00:00Z",
    "advisory" : "RHSA-2018:2791",
    "cpe" : "cpe:/o:redhat:rhel_aus:6.4",
    "package" : "kernel-0:2.6.32-358.93.1.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.5 Advanced Update Support",
    "release_date" : "2018-10-16T00:00:00Z",
    "advisory" : "RHSA-2018:2933",
    "cpe" : "cpe:/o:redhat:rhel_aus:6.5",
    "package" : "kernel-0:2.6.32-431.93.2.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.6 Advanced Update Support",
    "release_date" : "2018-10-16T00:00:00Z",
    "advisory" : "RHSA-2018:2924",
    "cpe" : "cpe:/o:redhat:rhel_aus:6.6",
    "package" : "kernel-0:2.6.32-504.76.2.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.6 Telco Extended Update Support",
    "release_date" : "2018-10-16T00:00:00Z",
    "advisory" : "RHSA-2018:2924",
    "cpe" : "cpe:/o:redhat:rhel_tus:6.6",
    "package" : "kernel-0:2.6.32-504.76.2.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.7 Extended Update Support",
    "release_date" : "2018-09-04T00:00:00Z",
    "advisory" : "RHSA-2018:2645",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.7",
    "package" : "kernel-0:2.6.32-573.62.1.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2018-08-14T00:00:00Z",
    "advisory" : "RHSA-2018:2395",
    "cpe" : "cpe:/a:redhat:rhel_extras_rt:7",
    "package" : "kernel-rt-0:3.10.0-862.11.6.rt56.819.el7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2018-08-14T00:00:00Z",
    "advisory" : "RHSA-2018:2384",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "kernel-0:3.10.0-862.11.6.el7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2018-10-30T00:00:00Z",
    "advisory" : "RHSA-2018:2948",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "kernel-alt-0:4.14.0-115.el7a"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.2 Advanced Update Support",
    "release_date" : "2018-09-25T00:00:00Z",
    "advisory" : "RHSA-2018:2790",
    "cpe" : "cpe:/o:redhat:rhel_aus:7.2",
    "package" : "kernel-0:3.10.0-327.73.1.el7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.2 Telco Extended Update Support",
    "release_date" : "2018-09-25T00:00:00Z",
    "advisory" : "RHSA-2018:2790",
    "cpe" : "cpe:/o:redhat:rhel_tus:7.2",
    "package" : "kernel-0:3.10.0-327.73.1.el7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions",
    "release_date" : "2018-09-25T00:00:00Z",
    "advisory" : "RHSA-2018:2790",
    "cpe" : "cpe:/o:redhat:rhel_e4s:7.2",
    "package" : "kernel-0:3.10.0-327.73.1.el7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.3 Extended Update Support",
    "release_date" : "2018-09-25T00:00:00Z",
    "advisory" : "RHSA-2018:2785",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.3",
    "package" : "kernel-0:3.10.0-514.58.1.el7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.4 Extended Update Support",
    "release_date" : "2018-09-25T00:00:00Z",
    "advisory" : "RHSA-2018:2776",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.4",
    "package" : "kernel-0:3.10.0-693.39.1.el7"
  }, {
    "product_name" : "Red Hat Enterprise MRG 2",
    "release_date" : "2018-09-25T00:00:00Z",
    "advisory" : "RHSA-2018:2789",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:2:server:el6",
    "package" : "kernel-rt-1:3.10.0-693.39.1.rt56.629.el6rt"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2018-08-16T00:00:00Z",
    "advisory" : "RHSA-2018:2402",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "rhvm-appliance-0:4.2-20180813.0"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2018-08-15T00:00:00Z",
    "advisory" : "RHSA-2018:2403",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "redhat-release-virtualization-host-0:4.2-5.2.el7"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2018-08-15T00:00:00Z",
    "advisory" : "RHSA-2018:2403",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "redhat-virtualization-host-0:4.2-20180813.0"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "impact" : "moderate"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2018-5390\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-5390\nhttps://access.redhat.com/articles/3553061\nhttps://www.kb.cert.org/vuls/id/962459\nhttps://www.spinics.net/lists/netdev/msg514742.html" ],
  "csaw" : true,
  "name" : "CVE-2018-5390"
}