vulnerability
CentOS Linux: CVE-2017-17805: Important: kernel-alt security, bug fix, and enhancement update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Dec 20, 2017 | Aug 20, 2019 | May 25, 2023 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Dec 20, 2017
Added
Aug 20, 2019
Modified
May 25, 2023
Description
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
Solution(s)
centos-upgrade-kernelcentos-upgrade-kernel-rt
References
- BID-102291
- DEBIAN-DSA-4073
- DEBIAN-DSA-4082
- NVD-CVE-2017-17805
- REDHAT-RHSA-2018:2948
- REDHAT-RHSA-2018:3083
- REDHAT-RHSA-2018:3096
- REDHAT-RHSA-2019:2473
- SUSE-SUSE-SU-2018:0010
- SUSE-SUSE-SU-2018:0011
- SUSE-SUSE-SU-2018:0012
- UBUNTU-USN-3617-1
- UBUNTU-USN-3617-2
- UBUNTU-USN-3617-3
- UBUNTU-USN-3619-1
- UBUNTU-USN-3619-2
- UBUNTU-USN-3620-1
- UBUNTU-USN-3620-2
- UBUNTU-USN-3632-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.