Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-4653

Опубликовано: 18 июн. 2014
Источник: redhat
CVSS2: 3.8
EPSS Низкий

Описание

sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.

A use-after-free flaw was found in the way the Linux kernel's Advanced Linux Sound Architecture (ALSA) implementation handled user controls. A local, privileged user could use this flaw to crash the system.

Отчет

This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for the respective releases may address this issue. Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelAffected
Red Hat Enterprise Linux 6kernelFixedRHSA-2014:139213.10.2014
Red Hat Enterprise Linux 7kernelFixedRHSA-2014:172428.10.2014
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2014:108320.08.2014

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1113409Kernel: ALSA: control: do not access controls outside of protected regions

EPSS

Процентиль: 21%
0.00066
Низкий

3.8 Low

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.

nvd
больше 11 лет назад

sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.

debian
больше 11 лет назад

sound/core/control.c in the ALSA control implementation in the Linux k ...

github
больше 3 лет назад

sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.

oracle-oval
больше 11 лет назад

ELSA-2014-1724: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 21%
0.00066
Низкий

3.8 Low

CVSS2