aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLaura Abbott <labbott@fedoraproject.org>2015-09-29 20:10:10 -0400
committerMauro Carvalho Chehab <mchehab@osg.samsung.com>2015-10-22 13:48:25 -0400
commita828d72df216c36e9c40b6c24dc4b17b6f7b5a76 (patch)
tree03f35fc02a8c34cf42461b7ee09eb4c5cc3c9768
parent54bec3970cb5351d08866af1ea8b0787edd7ede3 (diff)
[media] si2157: Bounds check firmware
When reading the firmware and sending commands, the length must be bounds checked to avoid overrunning the size of the command buffer and smashing the stack if the firmware is not in the expected format. Add the proper check. Cc: stable@kernel.org Signed-off-by: Laura Abbott <labbott@fedoraproject.org> Signed-off-by: Mauro Carvalho Chehab <mchehab@osg.samsung.com>
-rw-r--r--drivers/media/tuners/si2157.c4
1 files changed, 4 insertions, 0 deletions
diff --git a/drivers/media/tuners/si2157.c b/drivers/media/tuners/si2157.c
index 507382160e5e..ce157edd45fa 100644
--- a/drivers/media/tuners/si2157.c
+++ b/drivers/media/tuners/si2157.c
@@ -166,6 +166,10 @@ static int si2157_init(struct dvb_frontend *fe)
166 166
167 for (remaining = fw->size; remaining > 0; remaining -= 17) { 167 for (remaining = fw->size; remaining > 0; remaining -= 17) {
168 len = fw->data[fw->size - remaining]; 168 len = fw->data[fw->size - remaining];
169 if (len > SI2157_ARGLEN) {
170 dev_err(&client->dev, "Bad firmware length\n");
171 goto err_release_firmware;
172 }
169 memcpy(cmd.args, &fw->data[(fw->size - remaining) + 1], len); 173 memcpy(cmd.args, &fw->data[(fw->size - remaining) + 1], len);
170 cmd.wlen = len; 174 cmd.wlen = len;
171 cmd.rlen = 1; 175 cmd.rlen = 1;