In the Linux kernel, the following vulnerability has been resolved: media: staging/intel-ipu3: Fix set_fmt error handling If there in an error during a set_fmt, do not overwrite the previous sizes with the invalid config. Without this patch, v4l2-compliance ends up allocating 4GiB of RAM and causing the following OOPs [ 38.662975] ipu3-imgu 0000:00:05.0: swiotlb buffer is full (sz: 4096 bytes) [ 38.662980] DMA: Out of SW-IOMMU space for 4096 bytes at device 0000:00:05.0 [ 38.663010] general protection fault: 0000 [#1] PREEMPT SMP
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-02-27T18:40:29.903Z

Updated: 2024-08-04T05:17:42.870Z

Reserved: 2024-02-25T13:45:52.721Z

Link: CVE-2021-46943

cve-icon Vulnrichment

Updated: 2024-08-04T05:17:42.870Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-27T19:04:06.063

Modified: 2024-04-10T19:54:14.133

Link: CVE-2021-46943

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-02-27T00:00:00Z

Links: CVE-2021-46943 - Bugzilla