Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20181005165406.GA22722@openwall.com>
Date: Fri, 5 Oct 2018 18:54:06 +0200
From: Solar Designer <solar@...nwall.com>
To: luo <a4651386@....com>
Cc: oss-security@...ts.openwall.com
Subject: Re: CVE-2018-17977: CentOS ipsec remote denial of service vulnerability

On Fri, Oct 05, 2018 at 11:46:07PM +0800, luo wrote:
> I don't know if it is correct to publish the complete information.

It is.  Linking to temporary resources like Google Drive isn't great,
but luckily your message itself includes some detail.

> > The Linux kernel 4.14.67 mishandles certain interaction among XFRM
> > Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets, which
> > allows local users to cause a denial of service (memory consumption
> > and system hang) by leveraging root access to execute crafted
> > applications, as demonstrated on CentOS 7.

Since you say that "leveraging root access to execute crafted
applications" is required, how is this a security issue?  Also, since
this setup has to be prepared locally, how is the attack "remote"?

In other words, would a sysadmin plausibly make this kind of custom
local setup, and why?  If the answer is no, then I think there's no
security issue here.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.