Your submission was sent successfully! Close

USN-3311-2: libnl vulnerability

19 June 2017

libnl could be made to run programs as an administrator.

Releases

Packages

  • libnl3 - library for dealing with netlink sockets

Details

USN-3311-1 fixed a vulnerability in libnl. This update provides the
corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

It was discovered that libnl incorrectly handled memory when performing
certain operations. A local attacker could possibly use this issue to cause
libnl to crash, resulting in a denial of service, or execute arbitrary
code.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

Related notices

  • USN-3311-1: libnl-3-dev, libnl-route-3-dev, libnl-genl-3-200-udeb, libnl-xfrm-3-200, libnl-genl-3-dev, libnl-nf-3-200, libnl-3-200-udeb, libnl-nf-3-dev, libnl-utils, libnl-cli-3-200, libnl-idiag-3-dev, libnl-xfrm-3-dev, libnl3, libnl-genl-3-200, libnl-route-3-200, libnl-cli-3-dev, libnl-idiag-3-200, libnl-3-200