The snd_msnd_interrupt function in sound/isa/msnd/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "double fetch" vulnerability.
References
Link | Resource |
---|---|
https://bugzilla.kernel.org/show_bug.cgi?id=196131 | Issue Tracking Vendor Advisory |
http://www.securityfocus.com/bid/99314 | Third Party Advisory VDB Entry |
https://github.com/torvalds/linux/commit/20e2b791796bd68816fa115f12be5320de2b8021 | Third Party Advisory |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=20e2b791796bd68816fa115f12be5320de2b8021 | Vendor Advisory |
https://usn.ubuntu.com/3754-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-06-27 23:29
Updated : 2023-02-24 10:38
NVD link : CVE-2017-9984
Mitre link : CVE-2017-9984
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
linux
- linux_kernel