Skip to content

Commit 184025a

Browse files
committed
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
jira VULN-9668 cve CVE-2024-53104 commit-author Benoit Sevens <[email protected]> commit ecf2b43 This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in uvc_parse_streaming. Fixes: c0efd23 ("V4L/DVB (8145a): USB Video Class driver") Signed-off-by: Benoit Sevens <[email protected]> Cc: [email protected] Acked-by: Greg Kroah-Hartman <[email protected]> Reviewed-by: Laurent Pinchart <[email protected]> Signed-off-by: Hans Verkuil <[email protected]> (cherry picked from commit ecf2b43) Signed-off-by: Brett Mastbergen <[email protected]>
1 parent afc23ef commit 184025a

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

drivers/media/usb/uvc/uvc_driver.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -370,7 +370,7 @@ static int uvc_parse_format(struct uvc_device *dev,
370370
* Parse the frame descriptors. Only uncompressed, MJPEG and frame
371371
* based formats have frame descriptors.
372372
*/
373-
while (buflen > 2 && buffer[1] == USB_DT_CS_INTERFACE &&
373+
while (ftype && buflen > 2 && buffer[1] == USB_DT_CS_INTERFACE &&
374374
buffer[2] == ftype) {
375375
unsigned int maxIntervalIndex;
376376

0 commit comments

Comments
 (0)