7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved: media:
staging/intel-ipu3: Fix set_fmt error handling If there in an error during
a set_fmt, do not overwrite the previous sizes with the invalid config.
Without this patch, v4l2-compliance ends up allocating 4GiB of RAM and
causing the following OOPs [ 38.662975] ipu3-imgu 0000:00:05.0: swiotlb
buffer is full (sz: 4096 bytes) [ 38.662980] DMA: Out of SW-IOMMU space for
4096 bytes at device 0000:00:05.0 [ 38.663010] general protection fault:
0000 [#1] PREEMPT SMP
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < 5.4.0-77.86 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1051.53 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < 5.4.0-1051.53 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure-5.4 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | < 5.4.0-1013.16 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gcp | < 5.4.0-1046.49 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-gcp-5.4 | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-gke | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gkeop | < 5.4.0-1018.19 | UNKNOWN |
git.kernel.org/linus/ad91849996f9dd79741a961fd03585a683b08356 (5.13-rc1)
git.kernel.org/stable/c/34892ea938387d83ffcfb7775ec55f0f80767916
git.kernel.org/stable/c/6fb617e37a39db0a3eca4489431359d0bdf3b9bc
git.kernel.org/stable/c/a03fb1e8a110658215a4cefc3e2ad53279e496a6
git.kernel.org/stable/c/ad91849996f9dd79741a961fd03585a683b08356
git.kernel.org/stable/c/c6b81b897f6f9445d57f8d47c4e060ec21556137
launchpad.net/bugs/cve/CVE-2021-46943
nvd.nist.gov/vuln/detail/CVE-2021-46943
security-tracker.debian.org/tracker/CVE-2021-46943
www.cve.org/CVERecord?id=CVE-2021-46943
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
5.1%