CVE-2017-0553
Publication date 7 April 2017
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32342065. NOTE: this issue also exists in the upstream libnl before 3.3.0 library.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| libnl | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| libnl3 | ||
| 18.04 LTS bionic |
Fixed 3.2.29-0ubuntu3
|
|
| 16.04 LTS xenial |
Fixed 3.2.27-1ubuntu0.16.04.1
|
|
| 14.04 LTS trusty |
Fixed 3.2.21-1ubuntu4.1
|
|
Notes
seth-arnold
I'm not sure this fix is strictly a security fix; the checkin comment gives me the impression callers are completely trusted.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | High |
| Privileges required | None |
| User interaction | Required |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3311-1
- libnl vulnerability
- 6 June 2017
- USN-3311-2
- libnl vulnerability
- 19 June 2017