First published: Mon Mar 15 2021(Updated: )
It was discovered that librelp did not properly manage x509 certificates, leading to a stack-based buffer overflow. A remote attacker could possibly use this issue to execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/librelp0 | <1.2.14-3ubuntu0.1~esm1 | 1.2.14-3ubuntu0.1~esm1 |
=18.04 | ||
All of | ||
ubuntu/librelp0 | <1.2.9-1ubuntu0.1~esm1 | 1.2.9-1ubuntu0.1~esm1 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is USN-4828-1.
The severity of USN-4828-1 is high.
The librelp0 package with versions 1.2.14-3ubuntu0.1~esm1 and 1.2.9-1ubuntu0.1~esm1 is affected.
A remote attacker can exploit USN-4828-1 by using a stack-based buffer overflow to execute arbitrary code.
You can find more information about the USN-4828-1 vulnerability on the Ubuntu Security Notices website.