vulnerability
SUSE: CVE-2017-17806: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Dec 20, 2017 | Jan 4, 2018 | Feb 4, 2022 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Dec 20, 2017
Added
Jan 4, 2018
Modified
Feb 4, 2022
Description
The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.
Solution(s)
suse-upgrade-kernel-azure-basesuse-upgrade-kernel-defaultsuse-upgrade-kernel-default-extrasuse-upgrade-kernel-default-mansuse-upgrade-kernel-devel-azuresuse-upgrade-kernel-docssuse-upgrade-kernel-obs-buildsuse-upgrade-kernel-source-azure
References
- SUSE-SUSE-SU-2018:0010-1
- SUSE-SUSE-SU-2018:0011-1
- SUSE-SUSE-SU-2018:0012-1
- SUSE-SUSE-SU-2018:0040-1
- SUSE-SUSE-SU-2018:0180-1
- SUSE-SUSE-SU-2018:0213-1
- SUSE-SUSE-SU-2018:0437-1
- SUSE-SUSE-SU-2018:0525-1
- UBUNTU-USN-3583-1
- UBUNTU-USN-3583-2
- UBUNTU-USN-3617-1
- UBUNTU-USN-3617-2
- UBUNTU-USN-3617-3
- UBUNTU-USN-3619-1
- UBUNTU-USN-3619-2
- UBUNTU-USN-3632-1
- DEBIAN-DSA-4073
- DEBIAN-DSA-4082
- NVD-CVE-2017-17806

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.