[CVE-2011-4081] crypto ghash panic DOS
apw at canonical.com
Mon Nov 14 13:33:22 UTC 2011
Nick Bowler discovered the kernel GHASH message digest algorithm
incorrectly handled error conditions. A local attacker could
exploit this to cause a kernel oops.
This fix has already hit oneiric and precise via mainline and stable.
Following this email is a patch for lucid, maverick, maverick/ti-omap4,
natty, and natty/ti-omap4. This is a clean cherry-pick from mainline.
Proposing for lucid, maverick, maverick/ti-omap4, natty, and
More information about the kernel-team