Hide Forgot
Linux kernel built with the Advanced Linux Sound Architecture(ALSA) sound system support(CONFIG_SND) is vulnerable to a use after free flaw. It could occur when user space application removes arbitrary controls. A user/application could use this flaw to crash the system kernel resulting in DoS. Upstream fix: ------------- -> https://git.kernel.org/linus/82262a46627bebb0febcc26664746c25cef08563 Reference: ---------- -> http://www.openwall.com/lists/oss-security/2014/06/26/6
Statement: This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.
IssueDescription CVE-2014-4654: A use-after-free flaw was found in the way the Linux kernel's Advanced Linux Sound Architecture (ALSA) implementation handled user controls. A local, privileged user could use this flaw to crash the system. IssueDescription CVE-2014-4655: A use-after-free flaw was found in the way the Linux kernel's Advanced Linux Sound Architecture (ALSA) implementation handled user controls. A local, privileged user could use this flaw to crash the system.
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2014:1083 https://rhn.redhat.com/errata/RHSA-2014-1083.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2014:1392 https://rhn.redhat.com/errata/RHSA-2014-1392.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2014:1971 https://rhn.redhat.com/errata/RHSA-2014-1971.html