hshivhare67 / Kernel_4.1.15_CVE-2020-25668

Other
0 stars 0 forks source link

CVE-2017-17806 (High) detected in multiple libraries #971

Open mend-bolt-for-github[bot] opened 10 months ago

mend-bolt-for-github[bot] commented 10 months ago

CVE-2017-17806 - High Severity Vulnerability

Vulnerable Libraries - linuxlinux-4.1.18, linux-stable-rtv4.1, linux-stable-rtv4.1

Vulnerability Details

The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.

Publish Date: 2017-12-20

URL: CVE-2017-17806

CVSS 3 Score Details (7.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.linuxkernelcves.com/cves/CVE-2017-17806

Release Date: 2017-12-20

Fix Resolution: v4.15-rc4,v3.16.52,v3.18.89,v3.2.97,v4.1.49,v4.14.8,v4.4.107,v4.9.71


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 6 months ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.