CVE-2017-0553
Published: 07 April 2017
An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32342065. NOTE: this issue also exists in the upstream libnl before 3.3.0 library.
Priority
CVSS 3 base score: 7.0
Status
Package | Release | Status |
---|---|---|
libnl Launchpad, Ubuntu, Debian |
Upstream |
Needed
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was needed)
|
|
Patches: Upstream: http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb |
||
libnl3 Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.2.27-2)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(3.2.29-0ubuntu3)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(3.2.27-1ubuntu0.16.04.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(3.2.21-1ubuntu4.1)
|
|
Patches: Upstream: http://git.infradead.org/users/tgr/libnl.git/commit/3e18948f17148e6a3c4255bdeaaf01ef6081ceeb |
Notes
Author | Note |
---|---|
seth-arnold | I'm not sure this fix is strictly a security fix; the checkin comment gives me the impression callers are completely trusted. |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0553
- https://source.android.com/security/bulletin/2017-04-01
- https://usn.ubuntu.com/usn/usn-3311-1
- https://usn.ubuntu.com/usn/usn-3311-2
- NVD
- Launchpad
- Debian