Description
sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-103-1 | linux-2.6 security update |
EUVD |
EUVD-2014-4579 | sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access. |
Ubuntu USN |
USN-2332-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2333-1 | Linux kernel (EC2) vulnerabilities |
Ubuntu USN |
USN-2334-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2335-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-2336-1 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-2337-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T11:20:26.712Z
Reserved: 2014-06-25T00:00:00.000Z
Link: CVE-2014-4653
No data.
Status : Modified
Published: 2014-07-03T04:22:15.747
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-4653
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN