Количество 21
Количество 21

CVE-2017-17805
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.

CVE-2017-17805
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.

CVE-2017-17805
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
CVE-2017-17805
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 doe ...
GHSA-h6gr-h9qh-f94v
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
ELSA-2019-2473
ELSA-2019-2473: kernel security and bug fix update (IMPORTANT)

openSUSE-SU-2018:0023-1
Security update for the Linux Kernel

openSUSE-SU-2018:0022-1
Security update for the Linux Kernel

SUSE-SU-2018:0012-1
Security update for the Linux Kernel

SUSE-SU-2018:0010-1
Security update for the Linux Kernel
ELSA-2018-4299
ELSA-2018-4299: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2018:0525-1
Security update for the Linux Kernel

SUSE-SU-2018:0437-1
Security update for the Linux Kernel
ELSA-2018-4301
ELSA-2018-4301: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2018-4300
ELSA-2018-4300: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2018:0011-1
Security update for the Linux Kernel

SUSE-SU-2018:0213-1
Security update for the Linux Kernel
ELSA-2019-4316
ELSA-2019-4316: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2018:0180-1
Security update for the Linux Kernel
ELSA-2018-3083
ELSA-2018-3083: kernel security, bug fix, and enhancement update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2017-17805 The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable. | CVSS3: 7.8 | 0% Низкий | больше 7 лет назад |
![]() | CVE-2017-17805 The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable. | CVSS3: 5.5 | 0% Низкий | больше 7 лет назад |
![]() | CVE-2017-17805 The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable. | CVSS3: 7.8 | 0% Низкий | больше 7 лет назад |
CVE-2017-17805 The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 doe ... | CVSS3: 7.8 | 0% Низкий | больше 7 лет назад | |
GHSA-h6gr-h9qh-f94v The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
ELSA-2019-2473 ELSA-2019-2473: kernel security and bug fix update (IMPORTANT) | почти 6 лет назад | |||
![]() | openSUSE-SU-2018:0023-1 Security update for the Linux Kernel | больше 7 лет назад | ||
![]() | openSUSE-SU-2018:0022-1 Security update for the Linux Kernel | больше 7 лет назад | ||
![]() | SUSE-SU-2018:0012-1 Security update for the Linux Kernel | больше 7 лет назад | ||
![]() | SUSE-SU-2018:0010-1 Security update for the Linux Kernel | больше 7 лет назад | ||
ELSA-2018-4299 ELSA-2018-4299: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
![]() | SUSE-SU-2018:0525-1 Security update for the Linux Kernel | больше 7 лет назад | ||
![]() | SUSE-SU-2018:0437-1 Security update for the Linux Kernel | больше 7 лет назад | ||
ELSA-2018-4301 ELSA-2018-4301: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
ELSA-2018-4300 ELSA-2018-4300: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
![]() | SUSE-SU-2018:0011-1 Security update for the Linux Kernel | больше 7 лет назад | ||
![]() | SUSE-SU-2018:0213-1 Security update for the Linux Kernel | больше 7 лет назад | ||
ELSA-2019-4316 ELSA-2019-4316: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 6 лет назад | |||
![]() | SUSE-SU-2018:0180-1 Security update for the Linux Kernel | больше 7 лет назад | ||
ELSA-2018-3083 ELSA-2018-3083: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 6 лет назад |
Уязвимостей на страницу