Lucene search

K
akamaiblogAkamaiAKAMAIBLOG:CA172BF5AAF741436B9DD55773785FB3
HistoryAug 15, 2018 - 6:00 p.m.

Linux Kernel IP Vulnerability 2

2018-08-1518:00:00
Akamai
feedproxy.google.com
127

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.012 Low

EPSS

Percentile

83.2%

On the week of July 15th, researcher Juha-Matti Tilli disclosed a vulnerability in the Linux kernel to the kernel maintainers, the National Cyber Security Center - Finland (NCSC-FI), CERT Coordination Center (CERT/CC), and Akamai. The vulnerability, CVE-2018-5391, is a resource exhaustion attack triggered by a specially crafted stream of IP datagrams that cause expensive processing within the Linux kernel. This vulnerability is similar to the Linux TCP vulnerability announced August, 6th, 2018.

In preparation for the public disclosure of the vulnerability, Akamai prepared and began deploying patches for its network. Simultaneously, Akamai has been working with external parties to ensure the fix was sufficient to protect its network and customers. Akamai continues to work closely with the vulnerability coordinators at NCSC-FI and CERT/CC to aid the vulnerability disclosure, testing, and notification processes.

Impact on our Network

Shortly after notification of the vulnerability, we began the process of patching our systems, starting with the most critical of our services and continuing on to the rest of our network. Currently, all critical services are patched and we are working to complete the patching on the few remaining systems that could be impacted.

How to protect yourself

We recommend updating your operating system as soon as patches are available. Patches are expected to start appearing in normal distribution channels today, August 14th, with other vendors providing updates as they become available. Keep an eye out for CVE-2018-5391 listed in the release notes of your distribution.

Akamai thanks Juha-Matti Tilli for his efforts in working with our security team and other organizations involved to make it possible to quickly respond to this vulnerability.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.012 Low

EPSS

Percentile

83.2%