In the Linux kernel, the following vulnerability has been resolved:
media: staging/intel-ipu3: Fix set_fmt error handling
If there in an error during a set_fmt, do not overwrite the previous sizes with the invalid config.
Without this patch, v4l2-compliance ends up allocating 4GiB of RAM and causing the following OOPs
[ 38.662975] ipu3-imgu 0000:00:05.0: swiotlb buffer is full (sz: 4096 bytes) [ 38.662980] DMA: Out of SW-IOMMU space for 4096 bytes at device 0000:00:05.0 [ 38.663010] general protection fault: 0000 [#1] PREEMPT SMP
[
{
"events": [
{
"introduced": "5.2.0"
},
{
"fixed": "5.4.118"
}
]
},
{
"events": [
{
"introduced": "5.5.0"
},
{
"fixed": "5.10.36"
}
]
},
{
"events": [
{
"introduced": "5.11.0"
},
{
"fixed": "5.11.20"
}
]
},
{
"events": [
{
"introduced": "5.12.0"
},
{
"fixed": "5.12.3"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-46943.json"