Total vulnerabilities in the database
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
Software | From | Fixed in |
---|---|---|
linux / linux_kernel | 3.3 | 3.16.52 |
linux / linux_kernel | 2.6.25 | 3.2.97 |
linux / linux_kernel | 3.17 | 3.18.89 |
linux / linux_kernel | 3.19 | 4.1.49 |
linux / linux_kernel | 4.2 | 4.4.107 |
linux / linux_kernel | 4.5 | 4.9.71 |
linux / linux_kernel | 4.10 | 4.14.8 |
suse / linux_enterprise_server | 11-sp4 | 11-sp4.x |
suse / linux_enterprise_server | 11-extra | 11-extra.x |
suse / linux_enterprise_desktop | 12-sp2 | 12-sp2.x |
debian / debian_linux | 8.0 | 8.0.x |
opensuse_project / leap | 42.3 | 42.3.x |
suse / linux_enterprise_server_for_raspberry_pi | 12-sp2 | 12-sp2.x |
suse / linux_enterprise_server | 12-sp2 | 12-sp2.x |
debian / debian_linux | 9.0 | 9.0.x |
suse / linux_enterprise_desktop | 12-sp3 | 12-sp3.x |
suse / linux_enterprise_server | 12-sp3 | 12-sp3.x |
opensuse / leap | 42.2 | 42.2.x |
canonical / ubuntu_linux | 17.10 | 17.10.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
canonical / ubuntu_linux | 16.04 | 16.04.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |