Bug 1350801 (CVE-2014-9904) - CVE-2014-9904 kernel: Integer overflow in snd_compr_allocate_buffer()
Summary: CVE-2014-9904 kernel: Integer overflow in snd_compr_allocate_buffer()
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2014-9904
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-06-28 12:27 UTC by Adam Mariš
Modified: 2019-09-29 13:52 UTC (History)
32 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-06-28 12:28:23 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2016-06-28 12:27:49 UTC
The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.

Upstream patch:

https://github.com/torvalds/linux/commit/6217e5ede23285ddfee10d2e4ba0cc2d4c046205


Note You need to log in before you can comment on or make changes to this bug.