USN-3311-2: libnl vulnerability
19 June 2017
libnl could be made to run programs as an administrator.
Releases
Packages
- libnl3 - library for dealing with netlink sockets
Details
USN-3311-1 fixed a vulnerability in libnl. This update provides the
corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that libnl incorrectly handled memory when performing
certain operations. A local attacker could possibly use this issue to cause
libnl to crash, resulting in a denial of service, or execute arbitrary
code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-3311-1: libnl-utils, libnl-idiag-3-dev, libnl-genl-3-200-udeb, libnl-xfrm-3-200, libnl-xfrm-3-dev, libnl-3-200-udeb, libnl-genl-3-200, libnl-3-200, libnl-idiag-3-200, libnl-genl-3-dev, libnl-route-3-200, libnl-nf-3-dev, libnl-route-3-dev, libnl-3-dev, libnl3, libnl-nf-3-200, libnl-cli-3-dev, libnl-cli-3-200