Description
The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3616-1 | linux security update |
EUVD |
EUVD-2014-9709 | The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call. |
Ubuntu USN |
USN-3127-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3127-2 | Linux kernel (Trusty HWE) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2024-08-06T14:02:37.888Z
Reserved: 2016-06-24T00:00:00.000Z
Link: CVE-2014-9904
No data.
Status : Modified
Published: 2016-06-27T10:59:01.283
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-9904
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN