In the Linux kernel, the following vulnerability has been resolved:
media: staging/intel-ipu3: Fix set_fmt error handling
If there in an error during a set_fmt, do not overwrite the previous
sizes with the invalid config.
Without this patch, v4l2-compliance ends up allocating 4GiB of RAM and
causing the following OOPs
[ 38.662975] ipu3-imgu 0000:00:05.0: swiotlb buffer is full (sz: 4096 bytes)
[ 38.662980] DMA: Out of SW-IOMMU space for 4096 bytes at device 0000:00:05.0
[ 38.663010] general protection fault: 0000 [#1] PREEMPT SMP
Metrics
Affected Vendors & Products
References
History
Mon, 04 Nov 2024 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-02-27T18:40:29.903Z
Updated: 2024-12-19T07:32:16.807Z
Reserved: 2024-02-25T13:45:52.721Z
Link: CVE-2021-46943
Vulnrichment
Updated: 2024-08-04T05:17:42.870Z
NVD
Status : Modified
Published: 2024-02-27T19:04:06.063
Modified: 2024-11-21T06:34:59.360
Link: CVE-2021-46943
Redhat