First published: Tue Dec 13 2011(Updated: )
A bug was discovered in the XFS filesystem's handling of pathnames. A local attacker could exploit this to crash the system, leading to a denial of service, or gain root privileges. (CVE-2011-4077) Nick Bowler discovered the kernel GHASH message digest algorithm incorrectly handled error conditions. A local attacker could exploit this to cause a kernel oops. (CVE-2011-4081) A flaw was found in the Journaling Block Device (JBD). A local attacker able to mount ext3 or ext4 file systems could exploit this to crash the system, leading to a denial of service. (CVE-2011-4132) A bug was found in the way headroom check was performed in udp6_ufo_fragment() function. A remote attacker could use this flaw to crash the system. (CVE-2011-4326) Clement Lecigne discovered a bug in the HFS file system bounds checking. When a malformed HFS file system is mounted a local user could crash the system or gain root privileges. (CVE-2011-4330)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.35-903-omap4 | <2.6.35-903.28 | 2.6.35-903.28 |
Ubuntu gir1.2-packagekitglib-1.0 | =10.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-1302-1 is high, as it can lead to a denial of service or root privilege escalation.
To fix USN-1302-1, update your system with the latest kernel version provided by Ubuntu.
USN-1302-1 affects Ubuntu version 10.10 with the specified linux-image package.
USN-1302-1 addresses vulnerabilities related to the XFS filesystem's handling of pathnames and kernel message digest algorithms.
Yes, a local attacker could exploit USN-1302-1 to crash the system or gain elevated privileges.