[CVE-2011-4081] crypto ghash panic DOS

Andy Whitcroft apw at canonical.com
Mon Nov 14 13:33:22 UTC 2011


CVE-2011-4081
	Nick Bowler discovered the kernel GHASH message digest algorithm
	incorrectly handled error conditions. A local attacker could
	exploit this to cause a kernel oops.

This fix has already hit oneiric and precise via mainline and stable.
Following this email is a patch for lucid, maverick, maverick/ti-omap4,
natty, and natty/ti-omap4.  This is a clean cherry-pick from mainline.

Proposing for lucid, maverick, maverick/ti-omap4, natty, and
natty/ti-omap4.

-apw




More information about the kernel-team mailing list