Ubuntu plugs Linux kernel and OpenSSL holes that left users open to attack


Canonical has released several patches addressing flaws in the Linux kernel and OpenSSL that left Ubuntu users open to escalation of privilege and denial-of-service (DoS) attacks.
The most serious of the fixes covers a variety of flaws that could be used to gain elevated or administrative privileges on the victim machine.
"A memory corruption issue was discovered in AES decryption when using the Intel AES-NI accelerated code path. A remote attacker could exploit this flaw to cause a DoS (system crash) or potentially escalate privileges on Intel-based machines," read the Ubuntu security advisory.
-
- Login or register to post comments
Printer-friendly version
- 1356 reads
PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
- Dilution and Misuse of the "Linux" Brand
- Samsung, Red Hat to Work on Linux Drivers for Future Tech
- today's howtos
- Red Hat Hires a Blind Software Engineer to Improve Accessibility on Linux Desktop
- Today in Techrights
- Android Leftovers
- GnuCash 4.11
- today's leftovers
- Red Hat Servers, and AlmaLinux
- Digitally signing PDF documents in Linux: with hardware token & Okular
- today's howtos
- Accessibility in Fedora Workstation
- Android Leftovers
- Raspberry Pi Zero Prints Giant Pictures with Thermal Receipt Printer
- Excellent Utilities: Extension Manager - Browse, Install and Manage GNOME Shell Extensions
- Mozilla Firefox 102 Is Now Available for Download, Adds Geoclue Support on Linux
- Why I think the GNOME designers are incompetent
- Devices With GNU/Linux and Hardware Hacking
- today's howtos
- Canonical and IBM Leftovers
Recent comments
39 weeks 1 day ago
39 weeks 1 day ago
39 weeks 1 day ago
39 weeks 2 days ago
39 weeks 2 days ago
39 weeks 2 days ago
39 weeks 2 days ago
39 weeks 2 days ago
39 weeks 2 days ago
39 weeks 2 days ago