CVE-2014-4655
The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls.
Ver en NVDSeveridad
N/A
EPSS
Probabilidad de explotación (próx. 30 días): 0.0004 (0.0%)
Percentil: 11.1%
EPSS: 2026-05-06
Afecta
linux:linux_kernelsuse:linux_enterprise_servercanonical:ubuntu_linuxDescripción técnica
The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls.
Publicada: 3/7/2014, 4:22:15
Última modificación: 6/5/2026, 22:30:45
Referencias
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82262a46627bebb0febcc26664746c25cef08563
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
- http://rhn.redhat.com/errata/RHSA-2014-1083.html
- http://secunia.com/advisories/59434
- http://secunia.com/advisories/59777
- http://secunia.com/advisories/60545
- http://secunia.com/advisories/60564
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2