CVE-2017-17805

CVE Details

Release Date:2017-12-20

Description


The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 doesnot correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.

See more information about CVE-2017-17805 from MITRE CVE dictionary and NIST NVD


Notes



CVSS v2 metrics


NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score: Base Metrics:
Access Vector: Undefined Confidentiality Impact: Undefined
Access Impact: Undefined Integrity Impact: Undefined
Authentication: Undefined Availability Impact: Undefined

Errata information


PlatformErrataRelease Date
Oracle Linux version 5 (kernel-uek)ELSA-2018-43012018-12-09
Oracle Linux version 6 (dtrace-modules-3.8.13-118.28.1.el6uek)ELSA-2018-43002018-12-06
Oracle Linux version 6 (dtrace-modules-3.8.13-118.29.1.el6uek)ELSA-2019-43162019-01-04
Oracle Linux version 6 (kernel-uek)ELSA-2018-42992018-12-06
Oracle Linux version 6 (kernel-uek)ELSA-2018-43002018-12-06
Oracle Linux version 6 (kernel-uek)ELSA-2018-43012018-12-09
Oracle Linux version 6 (kernel-uek)ELSA-2019-43162019-01-04
Oracle Linux version 7 (dtrace-modules-3.8.13-118.28.1.el7uek)ELSA-2018-43002018-12-06
Oracle Linux version 7 (dtrace-modules-3.8.13-118.29.1.el7uek)ELSA-2019-43162019-01-04
Oracle Linux version 7 (kernel)ELSA-2018-30832018-11-05
Oracle Linux version 7 (kernel-uek)ELSA-2018-42992018-12-06
Oracle Linux version 7 (kernel-uek)ELSA-2018-43002018-12-06
Oracle Linux version 7 (kernel-uek)ELSA-2019-43162019-01-04
Oracle VM version 3.4 (kernel-uek)OVMSA-2018-02862018-12-07



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete