摘要:
In the Linux kernel, the following vulnerability has been resolved:
ALSA: pcm: oss: Limit the period size to 16MB
Set the practical limit to the period size (the fragment shift in OSS)
instead of a full 31bit; a too large value could lead to the exhaust
of memory as we allocate temporary buffers of the period size, too.
As of this patch, we set to 16MB limit, which should cover all use
cases.
安全等级: Low
公告ID: KylinSec-SA-2024-2727
发布日期: 2024年6月14日
关联CVE: CVE-2021-47509
In the Linux kernel, the following vulnerability has been resolved:
ALSA: pcm: oss: Limit the period size to 16MB
Set the practical limit to the period size (the fragment shift in OSS)
instead of a full 31bit; a too large value could lead to the exhaust
of memory as we allocate temporary buffers of the period size, too.
As of this patch, we set to 16MB limit, which should cover all use
cases.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2021-47509 | KY3.5.2 | kernel | Unaffected |
CVE-2021-47509 | V6 | kernel | Unaffected |