CVE-2017-0553
Publication date 7 April 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32342065. NOTE: this issue also exists in the upstream libnl before 3.3.0 library.
Status
Package | Ubuntu Release | Status |
---|---|---|
libnl | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
libnl3 | ||
18.04 LTS bionic |
Fixed 3.2.29-0ubuntu3
|
|
16.04 LTS xenial |
Fixed 3.2.27-1ubuntu0.16.04.1
|
|
14.04 LTS trusty |
Fixed 3.2.21-1ubuntu4.1
|
|
Notes
seth-arnold
I'm not sure this fix is strictly a security fix; the checkin comment gives me the impression callers are completely trusted.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.0 · High |
Attack vector | Local |
Attack complexity | High |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3311-1
- libnl vulnerability
- 6 June 2017
- USN-3311-2
- libnl vulnerability
- 19 June 2017