Your submission was sent successfully! Close

CVE-2015-3331

Published: 21 April 2015

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

From the Ubuntu security team

A memory corruption issue was discovered in AES decryption when using the Intel AES-NI accelerated code path. A remote attacker could exploit this flaw to cause a denial of service (system crash) or potentially escalate privileges on Intel base machines with AEC-GCM mode IPSec security association.

Priority

Medium

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
Patches:
Introduced by 0bd82f5f6355775fbaf7d3c664432ce1b862be1e
Fixed by ccfe8c3f7e52ae83155cb038753f4c75b774ca8a
linux-2.6
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc5)