← Back to CVEs
CVE-2017-0861
N/ADescription
Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.
CVE Details
CVSS v3.1 ScoreN/A
Published11/16/2017
Last Modified4/20/2025
Sourcenvd
Honeypot Sightings0
Affected Products
google:android
Weaknesses (CWE)
CWE-416
References
http://lists.alioth.debian.org/pipermail/secure-testing-commits/2017-December/059967.html(security@android.com)
http://www.securityfocus.com/bid/102329(security@android.com)
https://access.redhat.com/errata/RHSA-2018:2390(security@android.com)
https://access.redhat.com/errata/RHSA-2018:3083(security@android.com)
https://access.redhat.com/errata/RHSA-2018:3096(security@android.com)
https://access.redhat.com/errata/RHSA-2020:0036(security@android.com)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229(security@android.com)
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0(security@android.com)
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html(security@android.com)
https://security-tracker.debian.org/tracker/CVE-2017-0861(security@android.com)
https://source.android.com/security/bulletin/pixel/2017-11-01(security@android.com)
https://usn.ubuntu.com/3583-1/(security@android.com)
https://usn.ubuntu.com/3583-2/(security@android.com)
https://usn.ubuntu.com/3617-1/(security@android.com)
https://usn.ubuntu.com/3617-2/(security@android.com)
https://usn.ubuntu.com/3617-3/(security@android.com)
https://usn.ubuntu.com/3619-1/(security@android.com)
https://usn.ubuntu.com/3619-2/(security@android.com)
https://usn.ubuntu.com/3632-1/(security@android.com)
https://www.debian.org/security/2018/dsa-4187(security@android.com)
https://www.oracle.com/security-alerts/cpujul2020.html(security@android.com)
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html(security@android.com)
http://lists.alioth.debian.org/pipermail/secure-testing-commits/2017-December/059967.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/102329(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2390(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3083(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3096(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2020:0036(af854a3a-2127-422b-91ae-364da2661108)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229(af854a3a-2127-422b-91ae-364da2661108)
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html(af854a3a-2127-422b-91ae-364da2661108)
https://security-tracker.debian.org/tracker/CVE-2017-0861(af854a3a-2127-422b-91ae-364da2661108)
https://source.android.com/security/bulletin/pixel/2017-11-01(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3583-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3583-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3617-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3617-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3617-3/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3619-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3619-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3632-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4187(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.