The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2017-12-20T23:00:00

Updated: 2024-08-05T20:59:17.879Z

Reserved: 2017-12-20T00:00:00

Link: CVE-2017-17805

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2017-12-20T23:29:00.327

Modified: 2023-01-19T15:45:33.937

Link: CVE-2017-17805

cve-icon Redhat

Severity : Moderate

Publid Date: 2017-11-29T00:00:00Z

Links: CVE-2017-17805 - Bugzilla