[PATCH 0/4] Venus driver fixes to avoid possible OOB accesses

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This series primarily adds check at relevant places in venus driver where there
are possible OOB accesses due to unexpected payload from venus firmware. The
patches describes the specific OOB possibility.

Please review and share your feedback.

Signed-off-by: Vikash Garodia <quic_vgarodia@xxxxxxxxxxx>
---
Vikash Garodia (4):
      media: venus: hfi_parser: add check to avoid out of bound access
      media: venus: hfi_parser: avoid OOB access beyond payload word count
      media: venus: hfi: add check to handle incorrect queue size
      media: venus: hfi: add a check to handle OOB in sfr region

 drivers/media/platform/qcom/venus/hfi_parser.c |  6 +++++-
 drivers/media/platform/qcom/venus/hfi_venus.c  | 15 +++++++++++++--
 2 files changed, 18 insertions(+), 3 deletions(-)
---
base-commit: c7ccf3683ac9746b263b0502255f5ce47f64fe0a
change-id: 20241104-venus_oob-0343b143d61d

Best regards,
-- 
Vikash Garodia <quic_vgarodia@xxxxxxxxxxx>





[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux