First published: Mon Jan 09 2012(Updated: )
Nick Bowler discovered the kernel GHASH message digest algorithm incorrectly handled error conditions. A local attacker could exploit this to cause a kernel oops.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.0.0-14-powerpc64-smp | <3.0.0-14.23 | 3.0.0-14.23 |
Ubuntu gir1.2-packagekitglib-1.0 | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-14-omap | <3.0.0-14.23 | 3.0.0-14.23 |
Ubuntu gir1.2-packagekitglib-1.0 | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-14-generic | <3.0.0-14.23 | 3.0.0-14.23 |
Ubuntu gir1.2-packagekitglib-1.0 | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-14-server | <3.0.0-14.23 | 3.0.0-14.23 |
Ubuntu gir1.2-packagekitglib-1.0 | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-14-powerpc-smp | <3.0.0-14.23 | 3.0.0-14.23 |
Ubuntu gir1.2-packagekitglib-1.0 | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-14-virtual | <3.0.0-14.23 | 3.0.0-14.23 |
Ubuntu gir1.2-packagekitglib-1.0 | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-14-powerpc | <3.0.0-14.23 | 3.0.0-14.23 |
Ubuntu gir1.2-packagekitglib-1.0 | =11.10 | |
All of | ||
ubuntu/linux-image-3.0.0-14-generic-pae | <3.0.0-14.23 | 3.0.0-14.23 |
Ubuntu gir1.2-packagekitglib-1.0 | =11.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-1322-1 has a moderate severity, as it could lead to a kernel oops under certain circumstances.
To fix USN-1322-1, upgrade your Linux kernel to version 3.0.0-14.23 or later for Ubuntu 11.10.
USN-1322-1 affects several Linux kernel packages on Ubuntu 11.10, specifically various image packages.
The vulnerability identified in USN-1322-1 was discovered by Nick Bowler.
USN-1322-1 requires local access to exploit, as it is a local vulnerability affecting kernel operations.