Vulnerability Description
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 2.6.25, < 3.2.97 |
| Debian | Debian Linux | 8.0 |
| Opensuse | Leap | 42.2 |
| Opensuse Project | Leap | 42.3 |
| Suse | Linux Enterprise Desktop | 12 |
| Suse | Linux Enterprise Server | 11 |
| Suse | Linux Enterprise Server For Raspberry Pi | 12 |
| Canonical | Ubuntu Linux | 12.04 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ecaaabPatch
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.htmlThird Party Advisory
- http://www.securityfocus.com/bid/102291Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:2948Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:3083Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:3096Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2473Third Party Advisory
- https://github.com/torvalds/linux/commit/ecaaab5649781c5a0effdaf298a925063020500Patch
- https://lists.debian.org/debian-lts-announce/2018/01/msg00004.htmlThird Party Advisory
- https://usn.ubuntu.com/3617-1/Third Party Advisory
- https://usn.ubuntu.com/3617-2/Third Party Advisory
FAQ
What is CVE-2017-17805?
CVE-2017-17805 is a vulnerability with a CVSS score of 7.8 (HIGH). The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPT...
How severe is CVE-2017-17805?
CVE-2017-17805 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-17805?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux, Opensuse Leap, Opensuse Project Leap, Suse Linux Enterprise Desktop.