In the Linux kernel, the following vulnerability has been resolved:
media: staging/intel-ipu3: Fix set_fmt error handling
If there in an error during a set_fmt, do not overwrite the previous
sizes with the invalid config.
Without this patch, v4l2-compliance ends up allocating 4GiB of RAM and
causing the following OOPs
[ 38.662975] ipu3-imgu 0000:00:05.0: swiotlb buffer is full (sz: 4096 bytes)
[ 38.662980] DMA: Out of SW-IOMMU space for 4096 bytes at device 0000:00:05.0
[ 38.663010] general protection fault: 0000 [#1] PREEMPT SMP
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-02-27T18:40:29.903Z
Updated: 2024-08-04T05:17:42.870Z
Reserved: 2024-02-25T13:45:52.721Z
Link: CVE-2021-46943
Vulnrichment
Updated: 2024-08-04T05:17:42.870Z
NVD
Status : Analyzed
Published: 2024-02-27T19:04:06.063
Modified: 2024-04-10T19:54:14.133
Link: CVE-2021-46943
Redhat