Hide Forgot
Linux kernel built with the Advanced Linux Sound Architecture(ALSA) sound system support(CONFIG_SND) is vulnerable to a use after free flaw. It could occur when accessing card->controls list memory. A user/application could use this flaw to crash the system kernel resulting in DoS. Upstream fix: ------------- -> https://git.kernel.org/linus/fd9f26e4eca5d08a27d12c0933fceef76ed9663d Reference: ---------- -> http://www.openwall.com/lists/oss-security/2014/06/26/6
Statement: This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for the respective releases may address this issue. Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
IssueDescription: A use-after-free flaw was found in the way the Linux kernel's Advanced Linux Sound Architecture (ALSA) implementation handled user controls. A local, privileged user could use this flaw to crash the system.
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2014:1083 https://rhn.redhat.com/errata/RHSA-2014-1083.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2014:1392 https://rhn.redhat.com/errata/RHSA-2014-1392.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2014:1724 https://rhn.redhat.com/errata/RHSA-2014-1724.html