MGASA-2017-0158

Source
https://advisories.mageia.org/MGASA-2017-0158.html
Import Source
https://advisories.mageia.org/MGASA-2017-0158.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0158
Related
Published
2017-06-08T21:39:47Z
Modified
2017-06-08T21:26:35Z
Summary
Updated libnl3 packages fix security vulnerability
Details

An elevation of privilege vulnerability in the libnl library could enable a local malicious application to execute arbitrary code within the context of a privileged process (CVE-2017-0386).

An integer overflow vulnerability was found in nlmsg_reserve() triggered by crafted @len argument resulting into reserving too few bytes (CVE-2017-0553).

References
Credits

Affected packages

Mageia:5 / libnl3

Package

Name
libnl3
Purl
pkg:rpm/mageia/libnl3?arch=source&distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.25-3.1.mga5

Ecosystem specific

{
    "section": "core"
}