CVE-2021-47509

In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: oss: Limit the period size to 16MB Set the practical limit to the period size (the fragment shift in OSS) instead of a full 31bit; a too large value could lead to the exhaust of memory as we allocate temporary buffers of the period size, too. As of this patch, we set to 16MB limit, which should cover all use cases.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*

History

29 Sep 2025, 16:30

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/2e54cf6794bf82a54aaefc78da13819aea9cd28a - () https://git.kernel.org/stable/c/2e54cf6794bf82a54aaefc78da13819aea9cd28a - Patch
References () https://git.kernel.org/stable/c/35a3e511032146941085f87dd9fb5b82ea5c00a2 - () https://git.kernel.org/stable/c/35a3e511032146941085f87dd9fb5b82ea5c00a2 - Patch
References () https://git.kernel.org/stable/c/76f19e4cbb548e28547f8c328aa0bfb3a10222d3 - () https://git.kernel.org/stable/c/76f19e4cbb548e28547f8c328aa0bfb3a10222d3 - Patch
References () https://git.kernel.org/stable/c/8839c8c0f77ab8fc0463f4ab8b37fca3f70677c2 - () https://git.kernel.org/stable/c/8839c8c0f77ab8fc0463f4ab8b37fca3f70677c2 - Patch
References () https://git.kernel.org/stable/c/ad45babf7886e7a212ee1d5eda9ef49f696db43c - () https://git.kernel.org/stable/c/ad45babf7886e7a212ee1d5eda9ef49f696db43c - Patch
References () https://git.kernel.org/stable/c/b02a41eebcc36d4f07196780f2e165ca2c499257 - () https://git.kernel.org/stable/c/b02a41eebcc36d4f07196780f2e165ca2c499257 - Patch
References () https://git.kernel.org/stable/c/be55f306396cd62c6889286a7194fd8b53363aeb - () https://git.kernel.org/stable/c/be55f306396cd62c6889286a7194fd8b53363aeb - Patch
References () https://git.kernel.org/stable/c/d1bb703ad050de9095f10b2d3416c32921ac6bcc - () https://git.kernel.org/stable/c/d1bb703ad050de9095f10b2d3416c32921ac6bcc - Patch

21 Nov 2024, 06:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/2e54cf6794bf82a54aaefc78da13819aea9cd28a - () https://git.kernel.org/stable/c/2e54cf6794bf82a54aaefc78da13819aea9cd28a -
References () https://git.kernel.org/stable/c/35a3e511032146941085f87dd9fb5b82ea5c00a2 - () https://git.kernel.org/stable/c/35a3e511032146941085f87dd9fb5b82ea5c00a2 -
References () https://git.kernel.org/stable/c/76f19e4cbb548e28547f8c328aa0bfb3a10222d3 - () https://git.kernel.org/stable/c/76f19e4cbb548e28547f8c328aa0bfb3a10222d3 -
References () https://git.kernel.org/stable/c/8839c8c0f77ab8fc0463f4ab8b37fca3f70677c2 - () https://git.kernel.org/stable/c/8839c8c0f77ab8fc0463f4ab8b37fca3f70677c2 -
References () https://git.kernel.org/stable/c/ad45babf7886e7a212ee1d5eda9ef49f696db43c - () https://git.kernel.org/stable/c/ad45babf7886e7a212ee1d5eda9ef49f696db43c -
References () https://git.kernel.org/stable/c/b02a41eebcc36d4f07196780f2e165ca2c499257 - () https://git.kernel.org/stable/c/b02a41eebcc36d4f07196780f2e165ca2c499257 -
References () https://git.kernel.org/stable/c/be55f306396cd62c6889286a7194fd8b53363aeb - () https://git.kernel.org/stable/c/be55f306396cd62c6889286a7194fd8b53363aeb -
References () https://git.kernel.org/stable/c/d1bb703ad050de9095f10b2d3416c32921ac6bcc - () https://git.kernel.org/stable/c/d1bb703ad050de9095f10b2d3416c32921ac6bcc -

07 Nov 2024, 18:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: pcm: oss: Limitar el tamaño del período a 16 MB Establezca el límite práctico para el tamaño del período (el desplazamiento de fragmentos en OSS) en lugar de 31 bits completos; un valor demasiado grande podría provocar el agotamiento de la memoria, ya que también asignamos búferes temporales del tamaño del período. A partir de este parche, establecimos un límite de 16 MB, que debería cubrir todos los casos de uso.

24 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-24 15:15

Updated : 2025-09-29 16:30


NVD link : CVE-2021-47509

Mitre link : CVE-2021-47509

CVE.ORG link : CVE-2021-47509


JSON object : View

Products Affected

linux

  • linux_kernel