标题 简介 类型 公开时间
关联规则 关联知识 关联工具 关联文档 关联抓包
参考1(官网)
参考2
参考3
详情
[SAFE-ID: JIWO-2024-858]   作者: ecawen 发表于: [2017-10-17]

本文共 [472] 位读者顶过

Venustech ADLab(主动防御实验室)研究人员发现一个Linux内核漏洞(CVE-2017-15265),该漏洞由于Linux高级声音架构(ALSA)中的内存错误导致。漏洞利用成功后,可允许攻击者在目标系统提升权限。


This "snd_seq_create_port() creates a port object and returns its pointer, but it doesn't take the refcount, thus it can be deleted immediately by another thread," the researchers wrote in anadvisory published Wednesday.
"Meanwhile, snd_seq_ioctl_create_port() still calls the function snd_seq_system_client_ev_port_start() with the created port object that is being deleted, and this triggers use-after-free."
The vulnerability has been patched in Linux kernel version 4.13.4-2, which was fixed just by taking the refcount properly at "snd_seq_create_port()" and letting the caller unref the object after use.


评论

暂无
发表评论
 返回顶部 
热度(472)
 关注微信