From nobody Mon Feb 9 08:05:14 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id CE9C9EB64DA for ; Sat, 8 Jul 2023 15:24:23 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229833AbjGHPYW (ORCPT ); Sat, 8 Jul 2023 11:24:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57646 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229726AbjGHPYT (ORCPT ); Sat, 8 Jul 2023 11:24:19 -0400 Received: from out203-205-251-66.mail.qq.com (out203-205-251-66.mail.qq.com [203.205.251.66]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E7750170C for ; Sat, 8 Jul 2023 08:24:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=foxmail.com; s=s201512; t=1688829854; bh=vaylDKoxgIrBhavmAwyPUc47XqT+b4piq1AuB544sWs=; h=From:To:Cc:Subject:Date; b=YgcyAlTOocqbe9QZZu4elSg8GOKI4eJ2Zqt0hcL+EIExMxr91Q1s1Dt3p7zr9MLb4 NDXpk16JfoGHZXtJjNpgt/dSeIy/U5mW1wxqLHYSYskzEyi5UUAoW4JbaefRM9kJi7 icJQmLBMKrNOOiVspDaZy3CBiGgBhauUKe5qTyOo= Received: from KernelDevBox.byted.org ([180.184.103.200]) by newxmesmtplogicsvrszb9-0.qq.com (NewEsmtp) with SMTP id 60CB8219; Sat, 08 Jul 2023 23:24:12 +0800 X-QQ-mid: xmsmtpt1688829852tphn623yf Message-ID: X-QQ-XMAILINFO: Nb13eR/nWe3kdfAIccr+AJjdMx8nZXqdwm4yqJ4hx1+VwJDAtNjzQHUvsnCWQq a/mYtUBOT3Qj7t5nfP/yeVBL2CL44GltSne2V+NJija/JCpoNwIAebamHgCMOmAx9/boUtM8oOCV ePWehB8ROI2M4KU2Hg5vOlG5O8fjSIpfpN9bWf1Nst1C2V/1/DjfPEvnbSFCqOr98ARqFXPKEJD1 Ku1JjGZ1NprKllBizi1E75K7WqZFJkfJE/+juiAlrac0ZtGiRiavnD0ev8DYwlJxXXyY1LoRrUUP J5AF+O8Hxh1MzCi7rKDZ0meGipz9D4/Scel90eYdjq3D+d2vZPunL6Hzl+3EooaJupOuuTXEyFtQ XpwIeWPYmsw6kJLy9SFipa+qjjsQY+RT3zBC/Qc9e4SI2Li5vTmvT7T5j31wOnEVyuA2VZ/OUmHE /zuQ+s0FIhE0Ek1MkSleHu7MgE9IiN3EwEnga4nFebPcfj9AVb3Y+487lgtzw/mFq9I9NsbWOpZi DCr+cEd2q118pfo4LiI6Ge2G1cnj7ko1Xybo0SvH8IhmVaF62yetOcwlVU+RyvAB6DJZTLlBVFFN NGwj0HsBSkiOkpFlJeYERhTp9lGXG7TEcyRVsiK6UMamYcmDj+8zJpsrmc/sDQY0lk8WViwL681d j0nCTHfDJDOwDKf5PdDM+uimQEoFOqQR/g1Pzgsvyuv71AuEXLs2d2zB4mUkt26v27pqnc4m0KVF WRwbqGOY4NUwExMaJe81D1c4Z31bTYGeo7B4aQnOvFdqPuKar41faaH1sy7Wg+x3YnsN/E+WAnrr vYvpobxbeShuX0wBXKdNJbwnDHvjUvk6LYn48e6QmD1AyLdggSMVRTGoeaMc02hUa/ExZM72FmKI rJeoVGCfILLaEW7f0cIRBbGUBCz7eS21IANNqcqT8ysrNEMEEzdQYpAtfjdwSRfaRfp8awqRtam2 ei2uXs8SG+u/tjNntAhTG40VDvR2UQNKn9w/5lYL8ABjszfcTN3YOy7yOZck4duFBUpEHtgrsh+n nwcnZ8jQ== X-QQ-XMRINFO: Nq+8W0+stu50PRdwbJxPCL0= From: Zhang Shurong To: mchehab@kernel.org Cc: linux-media@vger.kernel.org, linux-kernel@vger.kernel.org, Zhang Shurong Subject: [PATCH] media: af9005: Fix null-ptr-deref in af9005_i2c_xfer Date: Sat, 8 Jul 2023 23:24:11 +0800 X-OQ-MSGID: <20230708152411.3694672-1-zhang_shurong@foxmail.com> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" In af9005_i2c_xfer, msg is controlled by user. When msg[i].buf is null and msg[i].len is zero, former checks on msg[i].buf would be passed. Malicious data finally reach af9005_i2c_xfer. If accessing msg[i].buf[0] without sanity check, null ptr deref would happen. We add check on msg[i].len to prevent crash. Similar commit: commit 0ed554fd769a ("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()") Signed-off-by: Zhang Shurong --- drivers/media/usb/dvb-usb/af9005.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/drivers/media/usb/dvb-usb/af9005.c b/drivers/media/usb/dvb-usb= /af9005.c index 0827bf3d4e8c..13604e6acdb8 100644 --- a/drivers/media/usb/dvb-usb/af9005.c +++ b/drivers/media/usb/dvb-usb/af9005.c @@ -422,6 +422,10 @@ static int af9005_i2c_xfer(struct i2c_adapter *adap, s= truct i2c_msg msg[], if (ret =3D=3D 0) ret =3D 2; } else { + if (msg[0].len < 2) { + ret =3D -EOPNOTSUPP; + goto unlock; + } /* write one or more registers */ reg =3D msg[0].buf[0]; addr =3D msg[0].addr; @@ -431,6 +435,7 @@ static int af9005_i2c_xfer(struct i2c_adapter *adap, st= ruct i2c_msg msg[], ret =3D 1; } =20 +unlock: mutex_unlock(&d->i2c_mutex); return ret; } --=20 2.30.2