Bug 1637504 (CVE-2018-17977) - CVE-2018-17977 kernel: Mishandled interactions among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets resulting in a denial of service
Summary: CVE-2018-17977 kernel: Mishandled interactions among XFRM Netlink messages, I...
Alias: CVE-2018-17977
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1637505
Blocks: 1637555
TreeView+ depends on / blocked
Reported: 2018-10-09 11:26 UTC by Andrej Nemec
Modified: 2021-12-10 17:51 UTC (History)
52 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Linux kernel's handling of complex interactions between netlink, IP, and AH style packets which can enter a state where the used memory will not be freed. This can eventually use all memory and possibly crash userspace programs due to lack of available memory.
Clone Of:
Last Closed: 2020-05-20 21:18:34 UTC

Attachments (Terms of Use)

Description Andrej Nemec 2018-10-09 11:26:50 UTC
It was found that the Linux kernel mishandles certain interaction among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets, which allows local users to cause a denial of service (memory consumption and system hang).



Comment 1 Andrej Nemec 2018-10-09 11:28:27 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1637505]

Comment 6 Salvatore Bonaccorso 2019-05-27 20:27:55 UTC

Before the files disapeared, was someone able to gather them?

Was this issue ever adressed upstream? Do you have more information on the fix for tracking the status?

Thanks already in advance if you can share more on it. I'm trying to determine the status for Debian in https://security-tracker.debian.org/tracker/CVE-2018-17977 for it.


Comment 7 Wade Mealing 2019-05-28 06:30:22 UTC
Salvatore , Emailed you a response.

Comment 8 Wade Mealing 2019-06-25 01:15:18 UTC

At this time this flaws reproduction environment is considered too extraordinary and will rarely be a feasable attack vector for most attackers.  The IPSEC connection between connected hosts is a somewhat privileged operation with a shared secret between systems,   Red Hat will unlikely fix this issue due to its significant setup complexity and unlikely configuration.

Comment 9 Product Security DevOps Team 2020-05-20 21:18:34 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):


Note You need to log in before you can comment on or make changes to this bug.