First published: Tue Jun 06 2017(Updated: )
It was discovered that libnl incorrectly handled memory when performing certain operations. A local attacker could possibly use this issue to cause libnl to crash, resulting in a denial of service, or execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libnl-3-200 | <3.2.29-0ubuntu2.1 | 3.2.29-0ubuntu2.1 |
=17.04 | ||
All of | ||
ubuntu/libnl-3-200 | <3.2.27-1ubuntu0.16.10.1 | 3.2.27-1ubuntu0.16.10.1 |
=16.10 | ||
All of | ||
ubuntu/libnl-3-200 | <3.2.27-1ubuntu0.16.04.1 | 3.2.27-1ubuntu0.16.04.1 |
=16.04 | ||
All of | ||
ubuntu/libnl-3-200 | <3.2.21-1ubuntu4.1 | 3.2.21-1ubuntu4.1 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.