Bug 1113409 (CVE-2014-4653)

Summary: CVE-2014-4653 Kernel: ALSA: control: do not access controls outside of protected regions
Product: [Other] Security Response Reporter: Prasad Pandit <ppandit>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: agordeev, anton, aquini, bhu, chazlett, davej, dhoward, esammons, fhrbata, gansalmon, iboverma, itamar, jforbes, jkacur, jonathan, jross, jrusnack, jwboyer, kernel-maint, kernel-mgr, lgoncalv, lwang, madhu.chinakonda, matt, mchehab, mcressma, npajkovs, pholasek, plougher, pmatouse, rt-maint, rvrbovsk, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
A use-after-free flaw was found in the way the Linux kernel's Advanced Linux Sound Architecture (ALSA) implementation handled user controls. A local, privileged user could use this flaw to crash the system.
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-10-28 22:15:58 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1117328, 1117329, 1117330, 1117331, 1117332    
Bug Blocks: 1112943    

Description Prasad Pandit 2014-06-26 07:10:35 UTC
Linux kernel built with the Advanced Linux Sound Architecture(ALSA) sound
system support(CONFIG_SND) is vulnerable to a use after free flaw. It
could occur when accessing card->controls list memory.

A user/application could use this flaw to crash the system kernel resulting in
DoS.

Upstream fix:
-------------
  -> https://git.kernel.org/linus/fd9f26e4eca5d08a27d12c0933fceef76ed9663d

Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2014/06/26/6

Comment 1 Prasad Pandit 2014-07-08 13:26:31 UTC
Statement:

This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for the respective releases may address this issue.

Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Comment 4 Martin Prpič 2014-08-18 11:18:01 UTC
IssueDescription:

A use-after-free flaw was found in the way the Linux kernel's Advanced Linux Sound Architecture (ALSA) implementation handled user controls. A local, privileged user could use this flaw to crash the system.

Comment 5 errata-xmlrpc 2014-08-20 10:51:49 UTC
This issue has been addressed in following products:

  MRG for RHEL-6 v.2

Via RHSA-2014:1083 https://rhn.redhat.com/errata/RHSA-2014-1083.html

Comment 6 errata-xmlrpc 2014-10-14 06:15:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:1392 https://rhn.redhat.com/errata/RHSA-2014-1392.html

Comment 8 errata-xmlrpc 2014-10-28 21:33:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2014:1724 https://rhn.redhat.com/errata/RHSA-2014-1724.html