Home / mailingsPDF  

[USN-3311-2] libnl vulnerability

Posted on 19 June 2017
Ubuntu Security

--===============6417709591660202225==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature"; boundary="MGYHOYXEY6WxJCY8"
Content-Disposition: inline


--MGYHOYXEY6WxJCY8
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-3311-2
June 19, 2017

libnl3 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

libnl could be made to run programs as an administrator.

Software Description:
- libnl3: library for dealing with netlink sockets

Details:

USN-3311-1 fixed a vulnerability in libnl. This update provides the
corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

It was discovered that libnl incorrectly handled memory when performing
certain operations. A local attacker could possibly use this issue to cause
libnl to crash, resulting in a denial of service, or execute arbitrary
code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
libnl-3-200 3.2.3-2ubuntu2.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3311-2
https://www.ubuntu.com/usn/usn-3311-1
CVE-2017-0553

 

TOP