Home / mailings [USN-3311-2] libnl vulnerability
Posted on 19 June 2017
Ubuntu Security--===============6417709591660202225==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature"; boundary="MGYHOYXEY6WxJCY8"
Content-Disposition: inline
--MGYHOYXEY6WxJCY8
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
==========================================================================
Ubuntu Security Notice USN-3311-2
June 19, 2017
libnl3 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
libnl could be made to run programs as an administrator.
Software Description:
- libnl3: library for dealing with netlink sockets
Details:
USN-3311-1 fixed a vulnerability in libnl. This update provides the
corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that libnl incorrectly handled memory when performing
certain operations. A local attacker could possibly use this issue to cause
libnl to crash, resulting in a denial of service, or execute arbitrary
code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
libnl-3-200 3.2.3-2ubuntu2.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3311-2
https://www.ubuntu.com/usn/usn-3311-1
CVE-2017-0553