In the Linux kernel, the following vulnerability has been resolved:
ALSA: pcm: oss: Limit the period size to 16MB
Set the practical limit to the period size (the fragment shift in OSS)
instead of a full 31bit; a too large value could lead to the exhaust
of memory as we allocate temporary buffers of the period size, too.
As of this patch, we set to 16MB limit, which should cover all use
cases.
References
Configurations
Configuration 1 (hide)
|
History
29 Sep 2025, 16:30
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/2e54cf6794bf82a54aaefc78da13819aea9cd28a - Patch | |
| References | () https://git.kernel.org/stable/c/35a3e511032146941085f87dd9fb5b82ea5c00a2 - Patch | |
| References | () https://git.kernel.org/stable/c/76f19e4cbb548e28547f8c328aa0bfb3a10222d3 - Patch | |
| References | () https://git.kernel.org/stable/c/8839c8c0f77ab8fc0463f4ab8b37fca3f70677c2 - Patch | |
| References | () https://git.kernel.org/stable/c/ad45babf7886e7a212ee1d5eda9ef49f696db43c - Patch | |
| References | () https://git.kernel.org/stable/c/b02a41eebcc36d4f07196780f2e165ca2c499257 - Patch | |
| References | () https://git.kernel.org/stable/c/be55f306396cd62c6889286a7194fd8b53363aeb - Patch | |
| References | () https://git.kernel.org/stable/c/d1bb703ad050de9095f10b2d3416c32921ac6bcc - Patch | |
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:* |
Information
Published : 2024-05-24 15:15
Updated : 2025-09-29 16:30
NVD link : CVE-2021-47509
Mitre link : CVE-2021-47509
CVE.ORG link : CVE-2021-47509
JSON object : View
Products Affected
linux
- linux_kernel
CWE
