Login
Newsletter
Werbung

Sicherheit: Zahlenüberlauf in libnl
Aktuelle Meldungen Distributionen
Name: Zahlenüberlauf in libnl
ID: USN-3311-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 16.10, Ubuntu 17.04
Datum: Di, 6. Juni 2017, 23:03
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0553

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============2020177294000929641==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="ewNKcrwnR9ANi3jqphGVbww33ihh8AJ2i"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--ewNKcrwnR9ANi3jqphGVbww33ihh8AJ2i
Content-Type: multipart/mixed;
boundary="2N04kMv6Fc7bWVtpmbCnhRxVpsrwvuUOW";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <8543d1a5-9c5b-5c5e-1332-62574f9188f5@canonical.com>
Subject: [USN-3311-1] libnl vulnerability

--2N04kMv6Fc7bWVtpmbCnhRxVpsrwvuUOW
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3311-1
June 06, 2017

libnl3 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

libnl could be made to crash or run programs.

Software Description:
- libnl3: library for dealing with netlink sockets

Details:

It was discovered that libnl incorrectly handled memory when performing
certain operations. A local attacker could possibly use this issue to cause
libnl to crash, resulting in a denial of service, or execute arbitrary
code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
libnl-3-200 3.2.29-0ubuntu2.1

Ubuntu 16.10:
libnl-3-200 3.2.27-1ubuntu0.16.10.1

Ubuntu 16.04 LTS:
libnl-3-200 3.2.27-1ubuntu0.16.04.1

Ubuntu 14.04 LTS:
libnl-3-200 3.2.21-1ubuntu4.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3311-1
CVE-2017-0553

Package Information:
https://launchpad.net/ubuntu/+source/libnl3/3.2.29-0ubuntu2.1
https://launchpad.net/ubuntu/+source/libnl3/3.2.27-1ubuntu0.16.10.1
https://launchpad.net/ubuntu/+source/libnl3/3.2.27-1ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/libnl3/3.2.21-1ubuntu4.1



--2N04kMv6Fc7bWVtpmbCnhRxVpsrwvuUOW--

--ewNKcrwnR9ANi3jqphGVbww33ihh8AJ2i
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=uoTn
-----END PGP SIGNATURE-----

--ewNKcrwnR9ANi3jqphGVbww33ihh8AJ2i--


--===============2020177294000929641==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============2020177294000929641==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung