CWE
362 416
Advisory Published
CVE Published
Updated

CVE-2017-15265: Race Condition

First published: Fri Oct 13 2017(Updated: )

A use-after-free vulnerability was found at creating and deleting a port via an ioctl on /dev/snd/seq. The snd_seq_create_port() function creates a port object and returns its pointer, but it doesn't take a refcount and can be deleted immediately by another thread. Meanwhile, snd_seq_ioctl_create_port() still calls the function snd_seq_system_client_ev_port_start() with the created port object that is being deleted, which triggers use-after-free. An attacker can race this use for memory corruption or possibly privilege escalation. At the time of writing, the permissions on the device file required a local console user to be issue the ioctl to allow for the exploit to work correctly. Remote users accessing the system via a shell were not granted permissions to issue an IOCTL that can trigger this condition. References: <a href="http://seclists.org/oss-sec/2017/q4/58">http://seclists.org/oss-sec/2017/q4/58</a> <a href="http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html">http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html</a> An upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026</a>

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Android
Linux Kernel<3.2.95
Linux Kernel>=3.3<3.10.108
Linux Kernel>=3.11<3.16.50
Linux Kernel>=3.17<3.18.76
Linux Kernel>=3.19<4.1.46
Linux Kernel>=4.2<4.4.93
Linux Kernel>=4.5<4.9.57
Linux Kernel>=4.10<4.13.8
debian/linux
5.10.223-1
5.10.234-1
6.1.129-1
6.1.135-1
6.12.22-1
6.12.25-1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2017-15265?

    CVE-2017-15265 is classified as a high-severity use-after-free vulnerability that can lead to potential system crashes or arbitrary code execution.

  • How do I fix CVE-2017-15265?

    To fix CVE-2017-15265, upgrade to a patched version of the Linux kernel, specifically versions 5.10.223-1, 5.10.226-1, 6.1.119-1, 6.1.123-1, 6.12.10-1, or 6.12.11-1.

  • Which Linux Kernel versions are affected by CVE-2017-15265?

    CVE-2017-15265 affects Linux Kernel versions prior to 3.2.95 and versions between 3.3 and 4.13.8.

  • What causes CVE-2017-15265?

    CVE-2017-15265 is caused by the snd_seq_create_port() function not maintaining reference counts, allowing immediate deletion of a port object by another thread.

  • Is CVE-2017-15265 specific to any particular operating system?

    CVE-2017-15265 primarily affects the Linux kernel and, by extension, Linux-based operating systems like Android.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203