vulnerability
SUSE: CVE-2017-17805: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Dec 20, 2017 | Jan 4, 2018 | Feb 4, 2022 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Dec 20, 2017
Added
Jan 4, 2018
Modified
Feb 4, 2022
Description
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
Solution(s)
suse-upgrade-kernel-azure-basesuse-upgrade-kernel-defaultsuse-upgrade-kernel-default-extrasuse-upgrade-kernel-default-mansuse-upgrade-kernel-devel-azuresuse-upgrade-kernel-docssuse-upgrade-kernel-obs-buildsuse-upgrade-kernel-source-azure
References
- SUSE-SUSE-SU-2018:0010
- SUSE-SUSE-SU-2018:0010-1
- SUSE-SUSE-SU-2018:0011
- SUSE-SUSE-SU-2018:0011-1
- SUSE-SUSE-SU-2018:0012
- SUSE-SUSE-SU-2018:0012-1
- SUSE-SUSE-SU-2018:0040-1
- SUSE-SUSE-SU-2018:0180-1
- SUSE-SUSE-SU-2018:0213-1
- SUSE-SUSE-SU-2018:0437-1
- SUSE-SUSE-SU-2018:0525-1
- BID-102291
- REDHAT-RHSA-2018:2948
- REDHAT-RHSA-2018:3083
- REDHAT-RHSA-2018:3096
- UBUNTU-USN-3617-1
- UBUNTU-USN-3617-2
- UBUNTU-USN-3617-3
- UBUNTU-USN-3619-1
- UBUNTU-USN-3619-2
- UBUNTU-USN-3620-1
- UBUNTU-USN-3620-2
- UBUNTU-USN-3632-1
- DEBIAN-DSA-4073
- DEBIAN-DSA-4082
- NVD-CVE-2017-17805

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.