mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-12-27 00:19:26 -05:00
082bc48c32
https://review.lineageos.org/q/topic:P_asb_2022-05 https://review.lineageos.org/q/topic:P_asb_2022-06 https://review.lineageos.org/q/topic:P_asb_2022-07 https://review.lineageos.org/q/topic:P_asb_2022-08 https://review.lineageos.org/q/topic:P_asb_2022-09 https://review.lineageos.org/q/topic:P_asb_2022-10 https://review.lineageos.org/q/topic:P_asb_2022-11 https://review.lineageos.org/q/topic:P_asb_2022-12 https://review.lineageos.org/q/topic:P_asb_2023-01 https://review.lineageos.org/q/topic:P_asb_2023-02 https://review.lineageos.org/q/topic:P_asb_2023-03 https://review.lineageos.org/q/topic:P_asb_2023-04 https://review.lineageos.org/q/topic:P_asb_2023-05 https://review.lineageos.org/q/topic:P_asb_2023-06 https://review.lineageos.org/q/topic:P_asb_2023-07 accounted for via manifest change: https://review.lineageos.org/c/LineageOS/android_external_freetype/+/361250 https://review.lineageos.org/q/topic:P_asb_2023-08 accounted for via manifest change: https://review.lineageos.org/c/LineageOS/android_external_freetype/+/364606 accounted for via patches: https://review.lineageos.org/c/LineageOS/android_system_ca-certificates/+/365328 https://review.lineageos.org/q/topic:P_asb_2023-09 https://review.lineageos.org/q/topic:P_asb_2023-10 https://review.lineageos.org/q/topic:P_asb_2023-11 accounted for via patches: https://review.lineageos.org/c/LineageOS/android_system_ca-certificates/+/374916 https://review.lineageos.org/q/topic:P_asb_2023-12 https://review.lineageos.org/q/topic:P_asb_2024-01 https://review.lineageos.org/q/topic:P_asb_2024-02 https://review.lineageos.org/q/topic:P_asb_2024-03 https://review.lineageos.org/q/topic:P_asb_2024-04 Signed-off-by: Tavi <tavi@divested.dev>
134 lines
5.8 KiB
Diff
134 lines
5.8 KiB
Diff
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
|
From: Keith Mok <keithmok@google.com>
|
|
Date: Mon, 22 Aug 2022 19:44:10 +0000
|
|
Subject: [PATCH] Fix integer overflow when parsing avrc response
|
|
|
|
Convert min_len from 16 bits to 32 bits to avoid
|
|
length checking overflow.
|
|
Also, use calloc instead of malloc for list allocation
|
|
since caller need to clean up string memory in the list items
|
|
|
|
Bug: 242459126
|
|
Test: fuzz_avrc
|
|
Tag: #security
|
|
Ignore-AOSP-First: Security
|
|
Merged-In: I7250509f2b320774926a8b24fd28828c5217d8a4
|
|
Change-Id: I7250509f2b320774926a8b24fd28828c5217d8a4
|
|
(cherry picked from commit a593687d6ad3978f48e2aa7be57d8239acdfa501)
|
|
Merged-In: I7250509f2b320774926a8b24fd28828c5217d8a4
|
|
---
|
|
stack/avdt/avdt_scb_act.cc | 2 +-
|
|
stack/avrc/avrc_pars_ct.cc | 29 +++++++++--------------------
|
|
2 files changed, 10 insertions(+), 21 deletions(-)
|
|
|
|
diff --git a/stack/avdt/avdt_scb_act.cc b/stack/avdt/avdt_scb_act.cc
|
|
index 9ff926509..31745bb2f 100644
|
|
--- a/stack/avdt/avdt_scb_act.cc
|
|
+++ b/stack/avdt/avdt_scb_act.cc
|
|
@@ -308,7 +308,7 @@ uint8_t* avdt_scb_hdl_report(AvdtpScb* p_scb, uint8_t* p, uint16_t len) {
|
|
uint8_t* p_start = p;
|
|
uint32_t ssrc;
|
|
uint8_t o_v, o_p, o_cc;
|
|
- uint16_t min_len = 0;
|
|
+ uint32_t min_len = 0;
|
|
AVDT_REPORT_TYPE pt;
|
|
tAVDT_REPORT_DATA report;
|
|
|
|
diff --git a/stack/avrc/avrc_pars_ct.cc b/stack/avrc/avrc_pars_ct.cc
|
|
index 3ea798f38..4e77a575d 100644
|
|
--- a/stack/avrc/avrc_pars_ct.cc
|
|
+++ b/stack/avrc/avrc_pars_ct.cc
|
|
@@ -141,7 +141,7 @@ static tAVRC_STS avrc_pars_vendor_rsp(tAVRC_MSG_VENDOR* p_msg,
|
|
|
|
tAVRC_STS avrc_parse_notification_rsp(uint8_t* p_stream, uint16_t len,
|
|
tAVRC_REG_NOTIF_RSP* p_rsp) {
|
|
- uint16_t min_len = 1;
|
|
+ uint32_t min_len = 1;
|
|
|
|
if (len < min_len) goto length_error;
|
|
BE_STREAM_TO_UINT8(p_rsp->event_id, p_stream);
|
|
@@ -228,7 +228,7 @@ static tAVRC_STS avrc_pars_browse_rsp(tAVRC_MSG_BROWSE* p_msg,
|
|
}
|
|
BE_STREAM_TO_UINT8(pdu, p);
|
|
uint16_t pkt_len;
|
|
- uint16_t min_len = 0;
|
|
+ uint32_t min_len = 0;
|
|
/* read the entire packet len */
|
|
BE_STREAM_TO_UINT16(pkt_len, p);
|
|
|
|
@@ -270,7 +270,7 @@ static tAVRC_STS avrc_pars_browse_rsp(tAVRC_MSG_BROWSE* p_msg,
|
|
get_item_rsp->uid_counter, get_item_rsp->item_count);
|
|
|
|
/* get each of the items */
|
|
- get_item_rsp->p_item_list = (tAVRC_ITEM*)osi_malloc(
|
|
+ get_item_rsp->p_item_list = (tAVRC_ITEM*)osi_calloc(
|
|
get_item_rsp->item_count * (sizeof(tAVRC_ITEM)));
|
|
tAVRC_ITEM* curr_item = get_item_rsp->p_item_list;
|
|
for (int i = 0; i < get_item_rsp->item_count; i++) {
|
|
@@ -360,7 +360,7 @@ static tAVRC_STS avrc_pars_browse_rsp(tAVRC_MSG_BROWSE* p_msg,
|
|
__func__, media->type, media->name.charset_id,
|
|
media->name.str_len, media->attr_count);
|
|
|
|
- media->p_attr_list = (tAVRC_ATTR_ENTRY*)osi_malloc(
|
|
+ media->p_attr_list = (tAVRC_ATTR_ENTRY*)osi_calloc(
|
|
media->attr_count * sizeof(tAVRC_ATTR_ENTRY));
|
|
for (int jk = 0; jk < media->attr_count; jk++) {
|
|
tAVRC_ATTR_ENTRY* attr_entry = &(media->p_attr_list[jk]);
|
|
@@ -371,14 +371,8 @@ static tAVRC_STS avrc_pars_browse_rsp(tAVRC_MSG_BROWSE* p_msg,
|
|
/* Parse the name now */
|
|
BE_STREAM_TO_UINT16(attr_entry->name.charset_id, p);
|
|
BE_STREAM_TO_UINT16(attr_entry->name.str_len, p);
|
|
- if (static_cast<uint16_t>(min_len + attr_entry->name.str_len) <
|
|
- min_len) {
|
|
- // Check for overflow
|
|
- android_errorWriteLog(0x534e4554, "205570663");
|
|
- }
|
|
- if (pkt_len - min_len < attr_entry->name.str_len)
|
|
- goto browse_length_error;
|
|
min_len += attr_entry->name.str_len;
|
|
+ if (pkt_len < min_len) goto browse_length_error;
|
|
attr_entry->name.p_str = (uint8_t*)osi_malloc(
|
|
attr_entry->name.str_len * sizeof(uint8_t));
|
|
BE_STREAM_TO_ARRAY(p, attr_entry->name.p_str,
|
|
@@ -447,7 +441,7 @@ static tAVRC_STS avrc_pars_browse_rsp(tAVRC_MSG_BROWSE* p_msg,
|
|
__func__, set_br_pl_rsp->status, set_br_pl_rsp->num_items,
|
|
set_br_pl_rsp->charset_id, set_br_pl_rsp->folder_depth);
|
|
|
|
- set_br_pl_rsp->p_folders = (tAVRC_NAME*)osi_malloc(
|
|
+ set_br_pl_rsp->p_folders = (tAVRC_NAME*)osi_calloc(
|
|
set_br_pl_rsp->num_items * sizeof(tAVRC_NAME));
|
|
|
|
/* Read each of the folder in the depth */
|
|
@@ -507,7 +501,7 @@ static tAVRC_STS avrc_ctrl_pars_vendor_rsp(tAVRC_MSG_VENDOR* p_msg,
|
|
p++; /* skip the reserved/packe_type byte */
|
|
|
|
uint16_t len;
|
|
- uint16_t min_len = 0;
|
|
+ uint32_t min_len = 0;
|
|
BE_STREAM_TO_UINT16(len, p);
|
|
AVRC_TRACE_DEBUG("%s ctype:0x%x pdu:0x%x, len:%d vendor_len=0x%x", __func__,
|
|
p_msg->hdr.ctype, p_result->pdu, len, p_msg->vendor_len);
|
|
@@ -781,12 +775,8 @@ static tAVRC_STS avrc_ctrl_pars_vendor_rsp(tAVRC_MSG_VENDOR* p_msg,
|
|
BE_STREAM_TO_UINT32(p_attrs[i].attr_id, p);
|
|
BE_STREAM_TO_UINT16(p_attrs[i].name.charset_id, p);
|
|
BE_STREAM_TO_UINT16(p_attrs[i].name.str_len, p);
|
|
- if (static_cast<uint16_t>(min_len + p_attrs[i].name.str_len) <
|
|
- min_len) {
|
|
- // Check for overflow
|
|
- android_errorWriteLog(0x534e4554, "205570663");
|
|
- }
|
|
- if (len - min_len < p_attrs[i].name.str_len) {
|
|
+ min_len += p_attrs[i].name.str_len;
|
|
+ if (len < min_len) {
|
|
for (int j = 0; j < i; j++) {
|
|
osi_free(p_attrs[j].name.p_str);
|
|
}
|
|
@@ -794,7 +784,6 @@ static tAVRC_STS avrc_ctrl_pars_vendor_rsp(tAVRC_MSG_VENDOR* p_msg,
|
|
p_result->get_attrs.num_attrs = 0;
|
|
goto length_error;
|
|
}
|
|
- min_len += p_attrs[i].name.str_len;
|
|
if (p_attrs[i].name.str_len > 0) {
|
|
p_attrs[i].name.p_str =
|
|
(uint8_t*)osi_calloc(p_attrs[i].name.str_len);
|