{"id":"CVE-2017-18075","details":"crypto/pcrypt.c in the Linux kernel before 4.14.13 mishandles freeing instances, allowing a local user able to access the AF_ALG-based AEAD interface (CONFIG_CRYPTO_USER_API_AEAD) and pcrypt (CONFIG_CRYPTO_PCRYPT) to cause a denial of service (kfree of an incorrect pointer) or possibly have unspecified other impact by executing a crafted sequence of system calls.","modified":"2026-03-15T22:15:34.797736Z","published":"2018-01-24T10:29:00.223Z","related":["SUSE-SU-2018:0568-1","SUSE-SU-2018:0572-1","SUSE-SU-2018:0573-1","SUSE-SU-2018:0574-1","SUSE-SU-2018:0575-1","SUSE-SU-2018:0576-1","SUSE-SU-2018:0577-1","SUSE-SU-2018:0578-1","SUSE-SU-2018:0579-1","SUSE-SU-2018:0582-1","SUSE-SU-2018:0584-1","SUSE-SU-2018:0586-1","SUSE-SU-2018:0590-1","SUSE-SU-2018:0591-1","SUSE-SU-2018:0592-1","SUSE-SU-2018:0593-1","SUSE-SU-2018:0594-1","SUSE-SU-2018:0595-1","SUSE-SU-2018:0596-1","SUSE-SU-2018:0597-1"],"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/102813"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2948"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3619-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3619-2/"},{"type":"REPORT","url":"https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.13"},{"type":"FIX","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d76c68109f37cb85b243a1cf0f40313afd2bae68"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/d76c68109f37cb85b243a1cf0f40313afd2bae68"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"4.2"},{"fixed":"4.4.111"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.9.76"}]},{"events":[{"introduced":"4.10"},{"fixed":"4.14.13"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-18075.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}