]> git.hungrycats.org Git - linux/commit
media: omap_vout: potential buffer overflow in vidioc_dqbuf()
authorDan Carpenter <dan.carpenter@oracle.com>
Thu, 11 Apr 2019 09:01:57 +0000 (05:01 -0400)
committerBen Hutchings <ben@decadent.org.uk>
Mon, 23 Sep 2019 20:12:01 +0000 (21:12 +0100)
commit00bd59675f5f81338c9edde2d71645aa286d1f84
treece20ca980f929a65f5ad22d3d72ddf117845859e
parent0c0c20a940b19138e42b57a68c2b1aafbb9846de
media: omap_vout: potential buffer overflow in vidioc_dqbuf()

commit dd6e2a981bfe83aa4a493143fd8cf1edcda6c091 upstream.

The "b->index" is a u32 the comes from the user in the ioctl.  It hasn't
been checked.  We aren't supposed to use it but we're instead supposed
to use the value that gets written to it when we call videobuf_dqbuf().

The videobuf_dqbuf() first memsets it to zero and then re-initializes it
inside the videobuf_status() function.  It's this final value which we
want.

Hans Verkuil pointed out that we need to check the return from
videobuf_dqbuf().  I ended up doing a little cleanup related to that as
well.

Fixes: 72915e851da9 ("[media] V4L2: OMAP: VOUT: dma map and unmap v4l2 buffers in qbuf and dqbuf")
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Hans Verkuil <hverkuil-cisco@xs4all.nl>
Signed-off-by: Mauro Carvalho Chehab <mchehab+samsung@kernel.org>
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
drivers/media/platform/omap/omap_vout.c