An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32342065. NOTE: this issue also exists in the upstream libnl before 3.3.0 library.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
artful libnl3 3.2.29-0ubuntu3
devel libnl3 3.2.29-0ubuntu3
precise libnl 1.1-7+deb7u1build0.12.04.1
precise/esm libnl3 3.2.3-2ubuntu2.1
trusty libnl None
libnl3 3.2.21-1ubuntu4.1
upstream libnl None
libnl3 3.2.27-2
xenial libnl3 3.2.27-1ubuntu0.16.04.1
yakkety libnl3 3.2.27-1ubuntu0.16.10.1
zesty libnl3 3.2.29-0ubuntu2.1


Release Package Reason
precise libnl3 ignored
vivid/stable-phone-overlay libnl3 ignored
libnl DNE
vivid/ubuntu-core libnl3 ignored
libnl DNE
precise/esm libnl DNE
xenial libnl DNE
yakkety libnl DNE
zesty libnl DNE
artful libnl DNE
devel libnl DNE