[packages/libnl1] Rel 6

arekm arekm at pld-linux.org
Sun Mar 15 11:59:44 CET 2026


commit 5757c72b7d313194a6f2a4046f95b3a969cbcd24
Author: Arkadiusz Miśkiewicz <arekm at maven.pl>
Date:   Sun Mar 15 11:59:37 2026 +0100

    Rel 6

 libnl-CVE-2017-0553.patch | 23 +++++++++++++++++++++++
 libnl1.spec               |  4 +++-
 2 files changed, 26 insertions(+), 1 deletion(-)
---
diff --git a/libnl1.spec b/libnl1.spec
index ec51747..4721f6c 100644
--- a/libnl1.spec
+++ b/libnl1.spec
@@ -6,7 +6,7 @@ Summary:	Netlink sockets library
 Summary(pl.UTF-8):	Biblioteka do obsługi gniazd netlink
 Name:		libnl1
 Version:	1.1.4
-Release:	5
+Release:	6
 License:	LGPL v2.1
 Group:		Libraries
 Source0:	http://people.suug.ch/~tgr/libnl/files/libnl-%{version}.tar.gz
@@ -14,6 +14,7 @@ Source0:	http://people.suug.ch/~tgr/libnl/files/libnl-%{version}.tar.gz
 Patch4:		libnl-1.0-pre8-more-build-output.patch
 Patch5:		libnl-1.1-include-limits-h.patch
 Patch6:		libnl-1.1-doc-inlinesrc.patch
+Patch7:		libnl-CVE-2017-0553.patch
 URL:		http://www.infradead.org/~tgr/libnl/
 BuildRequires:	autoconf
 BuildRequires:	automake
@@ -80,6 +81,7 @@ wygenerowane ze źródeł za pomocą doxygena.
 %patch -P4 -p1
 %patch -P5 -p1
 %patch -P6 -p1
+%patch -P7 -p1
 
 %build
 %{__aclocal}
diff --git a/libnl-CVE-2017-0553.patch b/libnl-CVE-2017-0553.patch
new file mode 100644
index 0000000..d0ab7c0
--- /dev/null
+++ b/libnl-CVE-2017-0553.patch
@@ -0,0 +1,23 @@
+From 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb Mon Sep 17 00:00:00 2001
+From: Thomas Haller <thaller at redhat.com>
+Date: Mon, 6 Feb 2017 14:05:02 +0100
+Subject: [PATCH] msg: add integer-overflow safeguard against @len for
+ nlmsg_reserve()
+
+Backport of upstream commit 3e18948f17148e6a3c4255bdeaaf01ef6081ceeb
+to libnl 1.1.4 to fix CVE-2017-0553 (integer overflow leading to
+heap-buffer overflow).
+
+diff --git a/lib/msg.c b/lib/msg.c
+--- a/lib/msg.c
++++ b/lib/msg.c
+@@ -512,6 +512,9 @@ void *nlmsg_reserve(struct nl_msg *n, size_t len, int pad)
+ 	void *buf = n->nm_nlh;
+ 	size_t nlmsg_len = n->nm_nlh->nlmsg_len;
+ 	size_t tlen;
++
++	if (len > n->nm_size)
++		return NULL;
+
+ 	tlen = pad ? ((len + (pad - 1)) & ~(pad - 1)) : len;
+
================================================================

---- gitweb:

http://git.pld-linux.org/gitweb.cgi/packages/libnl1.git/commitdiff/5757c72b7d313194a6f2a4046f95b3a969cbcd24



More information about the pld-cvs-commit mailing list