First published: Mon Apr 03 2017(Updated: )
An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32342065. NOTE: this issue also exists in the upstream libnl before 3.3.0 library.
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =5.0 | |
Google Android | =5.0.1 | |
Google Android | =5.0.2 | |
Google Android | =5.1 | |
Google Android | =5.1.0 | |
Google Android | =5.1.1 | |
Google Android | =6.0 | |
Google Android | =6.0.1 | |
Google Android | =7.0 | |
Google Android | =7.1.0 | |
Google Android | =7.1.1 | |
ubuntu/libnl | <1.1-7+ | 1.1-7+ |
ubuntu/libnl3 | <3.2.29-0ubuntu3 | 3.2.29-0ubuntu3 |
ubuntu/libnl3 | <3.2.29-0ubuntu3 | 3.2.29-0ubuntu3 |
ubuntu/libnl3 | <3.2.29-0ubuntu3 | 3.2.29-0ubuntu3 |
ubuntu/libnl3 | <3.2.29-0ubuntu3 | 3.2.29-0ubuntu3 |
ubuntu/libnl3 | <3.2.21-1ubuntu4.1 | 3.2.21-1ubuntu4.1 |
ubuntu/libnl3 | <3.2.27-2 | 3.2.27-2 |
ubuntu/libnl3 | <3.2.27-1ubuntu0.16.04.1 | 3.2.27-1ubuntu0.16.04.1 |
ubuntu/libnl3 | <3.2.27-1ubuntu0.16.10.1 | 3.2.27-1ubuntu0.16.10.1 |
ubuntu/libnl3 | <3.2.29-0ubuntu2.1 | 3.2.29-0ubuntu2.1 |
debian/libnl3 | 3.4.0-1 3.7.0-0.2 3.7.0-0.3 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.