The HMAC implementation (crypto/hmac.c) in the Linux kernel prior to 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel |
||
suse linux enterprise server 11 |
||
suse linux enterprise desktop 12 |
||
debian debian linux 8.0 |
||
opensuse project leap 42.3 |
||
suse linux enterprise server for raspberry pi 12 |
||
suse linux enterprise server 12 |
||
debian debian linux 9.0 |
||
opensuse leap 42.2 |
||
canonical ubuntu linux 17.10 |
||
canonical ubuntu linux 14.04 |
||
canonical ubuntu linux 16.04 |
||
canonical ubuntu linux 12.04 |