[USN-3311-2] libnl vulnerability
Tyler Hicks
tyhicks at canonical.com
Mon Jun 19 21:26:24 UTC 2017
==========================================================================
Ubuntu Security Notice USN-3311-2
June 19, 2017
libnl3 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
libnl could be made to run programs as an administrator.
Software Description:
- libnl3: library for dealing with netlink sockets
Details:
USN-3311-1 fixed a vulnerability in libnl. This update provides the
corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that libnl incorrectly handled memory when performing
certain operations. A local attacker could possibly use this issue to cause
libnl to crash, resulting in a denial of service, or execute arbitrary
code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
libnl-3-200 3.2.3-2ubuntu2.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3311-2
https://www.ubuntu.com/usn/usn-3311-1
CVE-2017-0553
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20170619/9a8bf905/attachment.sig>
More information about the ubuntu-security-announce
mailing list