Name | CVE-2017-17806 |
Description | The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1232-1, DSA-4073-1, DSA-4082-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
linux (PTS) | bullseye | 5.10.218-1 | fixed |
bullseye (security) | 5.10.221-1 | fixed | |
bookworm | 6.1.94-1 | fixed | |
bookworm (security) | 6.1.90-1 | fixed | |
trixie | 6.9.8-1 | fixed | |
sid | 6.9.9-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
linux | source | wheezy | 3.2.96-3 | DLA-1232-1 | ||
linux | source | jessie | 3.16.51-3+deb8u1 | DSA-4082-1 | ||
linux | source | stretch | 4.9.65-3+deb9u1 | DSA-4073-1 | ||
linux | source | (unstable) | 4.14.7-1 |
Fixed by: https://git.kernel.org/linus/af3ff8045bbf3e32f1a448542e73abb4c8ceb6f1 (v4.15-rc4)