First published: Fri Oct 13 2017(Updated: )
A use-after-free vulnerability was found at creating and deleting a port via an ioctl on /dev/snd/seq. The snd_seq_create_port() function creates a port object and returns its pointer, but it doesn't take a refcount and can be deleted immediately by another thread. Meanwhile, snd_seq_ioctl_create_port() still calls the function snd_seq_system_client_ev_port_start() with the created port object that is being deleted, which triggers use-after-free. An attacker can race this use for memory corruption or possibly privilege escalation. At the time of writing, the permissions on the device file required a local console user to be issue the ioctl to allow for the exploit to work correctly. Remote users accessing the system via a shell were not granted permissions to issue an IOCTL that can trigger this condition. References: <a href="http://seclists.org/oss-sec/2017/q4/58">http://seclists.org/oss-sec/2017/q4/58</a> <a href="http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html">http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html</a> An upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Linux Kernel | <3.2.95 | |
Linux Kernel | >=3.3<3.10.108 | |
Linux Kernel | >=3.11<3.16.50 | |
Linux Kernel | >=3.17<3.18.76 | |
Linux Kernel | >=3.19<4.1.46 | |
Linux Kernel | >=4.2<4.4.93 | |
Linux Kernel | >=4.5<4.9.57 | |
Linux Kernel | >=4.10<4.13.8 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15265 is classified as a high-severity use-after-free vulnerability that can lead to potential system crashes or arbitrary code execution.
To fix CVE-2017-15265, upgrade to a patched version of the Linux kernel, specifically versions 5.10.223-1, 5.10.226-1, 6.1.119-1, 6.1.123-1, 6.12.10-1, or 6.12.11-1.
CVE-2017-15265 affects Linux Kernel versions prior to 3.2.95 and versions between 3.3 and 4.13.8.
CVE-2017-15265 is caused by the snd_seq_create_port() function not maintaining reference counts, allowing immediate deletion of a port object by another thread.
CVE-2017-15265 primarily affects the Linux kernel and, by extension, Linux-based operating systems like Android.