CVE-2017-0861

Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.
References
Link Resource
http://lists.alioth.debian.org/pipermail/secure-testing-commits/2017-December/059967.html
http://www.securityfocus.com/bid/102329
https://access.redhat.com/errata/RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/errata/RHSA-2020:0036
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://security-tracker.debian.org/tracker/CVE-2017-0861
https://source.android.com/security/bulletin/pixel/2017-11-01 Patch Vendor Advisory
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3632-1/
https://www.debian.org/security/2018/dsa-4187
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
http://lists.alioth.debian.org/pipermail/secure-testing-commits/2017-December/059967.html
http://www.securityfocus.com/bid/102329
https://access.redhat.com/errata/RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2018:3083
https://access.redhat.com/errata/RHSA-2018:3096
https://access.redhat.com/errata/RHSA-2020:0036
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://security-tracker.debian.org/tracker/CVE-2017-0861
https://source.android.com/security/bulletin/pixel/2017-11-01 Patch Vendor Advisory
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3632-1/
https://www.debian.org/security/2018/dsa-4187
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Configurations

Configuration 1 (hide)

cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:03

Type Values Removed Values Added
References () http://lists.alioth.debian.org/pipermail/secure-testing-commits/2017-December/059967.html - () http://lists.alioth.debian.org/pipermail/secure-testing-commits/2017-December/059967.html -
References () http://www.securityfocus.com/bid/102329 - () http://www.securityfocus.com/bid/102329 -
References () https://access.redhat.com/errata/RHSA-2018:2390 - () https://access.redhat.com/errata/RHSA-2018:2390 -
References () https://access.redhat.com/errata/RHSA-2018:3083 - () https://access.redhat.com/errata/RHSA-2018:3083 -
References () https://access.redhat.com/errata/RHSA-2018:3096 - () https://access.redhat.com/errata/RHSA-2018:3096 -
References () https://access.redhat.com/errata/RHSA-2020:0036 - () https://access.redhat.com/errata/RHSA-2020:0036 -
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229 - () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229 -
References () https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - () https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 -
References () https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html - () https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html -
References () https://security-tracker.debian.org/tracker/CVE-2017-0861 - () https://security-tracker.debian.org/tracker/CVE-2017-0861 -
References () https://source.android.com/security/bulletin/pixel/2017-11-01 - Patch, Vendor Advisory () https://source.android.com/security/bulletin/pixel/2017-11-01 - Patch, Vendor Advisory
References () https://usn.ubuntu.com/3583-1/ - () https://usn.ubuntu.com/3583-1/ -
References () https://usn.ubuntu.com/3583-2/ - () https://usn.ubuntu.com/3583-2/ -
References () https://usn.ubuntu.com/3617-1/ - () https://usn.ubuntu.com/3617-1/ -
References () https://usn.ubuntu.com/3617-2/ - () https://usn.ubuntu.com/3617-2/ -
References () https://usn.ubuntu.com/3617-3/ - () https://usn.ubuntu.com/3617-3/ -
References () https://usn.ubuntu.com/3619-1/ - () https://usn.ubuntu.com/3619-1/ -
References () https://usn.ubuntu.com/3619-2/ - () https://usn.ubuntu.com/3619-2/ -
References () https://usn.ubuntu.com/3632-1/ - () https://usn.ubuntu.com/3632-1/ -
References () https://www.debian.org/security/2018/dsa-4187 - () https://www.debian.org/security/2018/dsa-4187 -
References () https://www.oracle.com/security-alerts/cpujul2020.html - () https://www.oracle.com/security-alerts/cpujul2020.html -
References () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -

Information

Published : 2017-11-16 23:29

Updated : 2024-11-21 03:03


NVD link : CVE-2017-0861

Mitre link : CVE-2017-0861

CVE.ORG link : CVE-2017-0861


JSON object : View

Products Affected

google

  • android
CWE
CWE-416

Use After Free