| Summary | In the Linux kernel, the following vulnerability has been resolved: media: qcom: camss: Remove use_count guard in stop_streaming The use_count check was introduced so that multiple concurrent Raw Data This is an invalid use of use_count though as use_count pertains to the If use_count and stream-on count don't agree then stop_streaming() will The use of use_count like this is a bit hacky and right now breaks regular [ 1265.509831] WARNING: CPU: 5 PID: 919 at drivers/media/common/videobuf2/videobuf2-core.c:2183 __vb2_queue_cancel+0x230/0x2c8 [videobuf2_common] One CAMSS specific way to handle multiple VCs on the same RDI might be: - Reference count each pipeline enable for CSIPHY, CSID, VFE and RDIx. Either way refusing to release video buffers based on use_count is Initial testing with this code didn't show an error but, SoftISP and "real" This commit partially reverts commit 89013969e232 ("media: camss: sm8250: |
|---|---|
| Publication Date | Nov. 8, 2024, 3:15 p.m. |
| Registration Date | Nov. 9, 2024, 5 a.m. |
| Last Update | Nov. 8, 2024, 3:15 p.m. |
| Title | Linux の Linux Kernel における脆弱性 |
|---|---|
| Summary | Linux の Linux Kernel には、不特定の脆弱性が存在します。 |
| Possible impacts | サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Aug. 9, 2024, midnight |
| Registration Date | Nov. 28, 2024, 12:55 p.m. |
| Last Update | Nov. 28, 2024, 12:55 p.m. |
| Linux |
| Linux Kernel 6.11 以上 6.11.3 未満 |
| Linux Kernel 6.4 以上 6.6.55 未満 |
| Linux Kernel 6.7 以上 6.10.14 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2024年11月28日] 掲載 |
Nov. 28, 2024, 12:55 p.m. |