Hash: SHA256

Package        : libnl3
Version        : 3.2.7-4+deb7u1
CVE ID         : CVE-2017-0553
Debian Bug     : #859948

It was discovered that there was an integer overflow in libnl3, a library for
dealing with netlink sockets.

A missing check in nlmsg_reserve() could have allowed a malicious application
to execute arbitrary code within the context of the WiFi service.

For Debian 7 "Wheezy", this issue has been fixed in libnl3 version
3.2.7-4+deb7u1.

We recommend that you upgrade your libnl3 packages.


Regards,

- -- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-

Debian LTS: DLA-892-1: libnl3 security update

April 10, 2017
It was discovered that there was an integer overflow in libnl3, a library for dealing with netlink sockets

Summary

A missing check in nlmsg_reserve() could have allowed a malicious application
to execute arbitrary code within the context of the WiFi service.

For Debian 7 "Wheezy", this issue has been fixed in libnl3 version
3.2.7-4+deb7u1.

We recommend that you upgrade your libnl3 packages.


Regards,

- --
,''`.
: :' : Chris Lamb
`. `'` lamby@debian.org / chris-lamb.co.uk
`-



Severity
Package : libnl3
Version : 3.2.7-4+deb7u1
CVE ID : CVE-2017-0553
Debian Bug : #859948

Related News