First published: Mon Jan 23 2012(Updated: )
Peter Huewe discovered an information leak in the handling of reading security-related TPM data. A local, unprivileged user could read the results of a previous TPM command. (CVE-2011-1162) Dan Rosenberg reported an error in the old ABI compatibility layer of ARM kernels. A local attacker could exploit this flaw to cause a denial of service or gain root privileges. (CVE-2011-1759) Ben Hutchings reported a flaw in the kernel's handling of corrupt LDM partitions. A local user could exploit this to cause a denial of service or escalate privileges. (CVE-2011-2182) Clement Lecigne discovered a bug in the HFS filesystem. A local attacker could exploit this to cause a kernel oops. (CVE-2011-2203) A flaw was found in how the Linux kernel handles user-defined key types. An unprivileged local user could exploit this to crash the system. (CVE-2011-4110)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.35-32-powerpc64-smp | <2.6.35-32.64 | 2.6.35-32.64 |
Ubuntu 22.04 LTS | =10.10 | |
All of | ||
ubuntu/linux-image-2.6.35-32-generic-pae | <2.6.35-32.64 | 2.6.35-32.64 |
Ubuntu 22.04 LTS | =10.10 | |
All of | ||
ubuntu/linux-image-2.6.35-32-versatile | <2.6.35-32.64 | 2.6.35-32.64 |
Ubuntu 22.04 LTS | =10.10 | |
All of | ||
ubuntu/linux-image-2.6.35-32-generic | <2.6.35-32.64 | 2.6.35-32.64 |
Ubuntu 22.04 LTS | =10.10 | |
All of | ||
ubuntu/linux-image-2.6.35-32-virtual | <2.6.35-32.64 | 2.6.35-32.64 |
Ubuntu 22.04 LTS | =10.10 | |
All of | ||
ubuntu/linux-image-2.6.35-32-powerpc-smp | <2.6.35-32.64 | 2.6.35-32.64 |
Ubuntu 22.04 LTS | =10.10 | |
All of | ||
ubuntu/linux-image-2.6.35-32-powerpc | <2.6.35-32.64 | 2.6.35-32.64 |
Ubuntu 22.04 LTS | =10.10 | |
All of | ||
ubuntu/linux-image-2.6.35-32-server | <2.6.35-32.64 | 2.6.35-32.64 |
Ubuntu 22.04 LTS | =10.10 | |
All of | ||
ubuntu/linux-image-2.6.35-32-omap | <2.6.35-32.64 | 2.6.35-32.64 |
Ubuntu 22.04 LTS | =10.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-1341-1 is considered to be high due to potential information leaks that could allow local, unprivileged users to access sensitive TPM data.
To fix USN-1341-1, you should update your system to the latest kernel version that addresses the vulnerabilities listed.
USN-1341-1 affects Ubuntu 10.10 with specific kernel versions, including 2.6.35-32 for various architectures.
The risks associated with USN-1341-1 include unauthorized access to sensitive TPM command results by local attackers.
Peter Huewe discovered the information leak, and Dan Rosenberg reported errors in the old ABI compatibility layer of ARM kernels.