It was found that the Linux kernel mishandles certain interaction among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets, which allows local users to cause a denial of service (memory consumption and system hang). References: https://seclists.org/oss-sec/2018/q4/15
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1637505]
Hi Before the files disapeared, was someone able to gather them? Was this issue ever adressed upstream? Do you have more information on the fix for tracking the status? Thanks already in advance if you can share more on it. I'm trying to determine the status for Debian in https://security-tracker.debian.org/tracker/CVE-2018-17977 for it. Regards, Salvatore
Salvatore , Emailed you a response.
Statement: At this time this flaws reproduction environment is considered too extraordinary and will rarely be a feasable attack vector for most attackers. The IPSEC connection between connected hosts is a somewhat privileged operation with a shared secret between systems, Red Hat will unlikely fix this issue due to its significant setup complexity and unlikely configuration.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-17977