Ubuntu plugs Linux kernel and OpenSSL holes that left users open to attack


Canonical has released several patches addressing flaws in the Linux kernel and OpenSSL that left Ubuntu users open to escalation of privilege and denial-of-service (DoS) attacks.
The most serious of the fixes covers a variety of flaws that could be used to gain elevated or administrative privileges on the victim machine.
"A memory corruption issue was discovered in AES decryption when using the Intel AES-NI accelerated code path. A remote attacker could exploit this flaw to cause a DoS (system crash) or potentially escalate privileges on Intel-based machines," read the Ubuntu security advisory.
-
- Login or register to post comments
Printer-friendly version
- 1364 reads
PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
- August 2007 (907)
- July 2007 (917)
- June 2007 (792)
- May 2007 (891)
- April 2007 (917)
- March 2007 (942)
- February 2007 (792)
- January 2007 (747)
- December 2006 (742)
- November 2006 (776)
- October 2006 (700)
- September 2006 (580)
- August 2006 (650)
- July 2006 (613)
- June 2006 (632)
- May 2006 (630)
- April 2006 (629)
- March 2006 (619)
- February 2006 (498)
- January 2006 (493)
- December 2005 (509)
- November 2005 (457)
- October 2005 (439)
- September 2005 (395)
- August 2005 (448)
- July 2005 (416)
- June 2005 (413)
- May 2005 (363)
- April 2005 (341)
- March 2005 (265)
Recent comments
47 weeks 5 days ago
47 weeks 5 days ago
47 weeks 5 days ago
47 weeks 5 days ago
47 weeks 5 days ago
47 weeks 5 days ago
47 weeks 5 days ago
47 weeks 6 days ago
47 weeks 6 days ago
47 weeks 6 days ago