diff options
| author | Alan Stern <[email protected]> | 2019-10-07 12:09:04 -0300 |
|---|---|---|
| committer | Mauro Carvalho Chehab <[email protected]> | 2019-10-10 07:22:06 -0300 |
| commit | c7a191464078262bf799136317c95824e26a222b (patch) | |
| tree | 8faf2a70d7adf38c6fdbc60aa1d2c60f1457e8b2 /tools/perf/scripts/python/syscall-counts.py | |
| parent | 59251a8be3c258c6ce59dcce703ce440a4e03b82 (diff) | |
media: usbvision: Fix invalid accesses after device disconnect
The syzbot fuzzer found two invalid-access bugs in the usbvision
driver. These bugs occur when userspace keeps the device file open
after the device has been disconnected and usbvision_disconnect() has
set usbvision->dev to NULL:
When the device file is closed, usbvision_radio_close() tries
to issue a usb_set_interface() call, passing the NULL pointer
as its first argument.
If userspace performs a querycap ioctl call, vidioc_querycap()
calls usb_make_path() with the same NULL pointer.
This patch fixes the problems by making the appropriate tests
beforehand. Note that vidioc_querycap() is protected by
usbvision->v4l2_lock, acquired in a higher layer of the V4L2
subsystem.
Reported-and-tested-by: [email protected]
Signed-off-by: Alan Stern <[email protected]>
CC: <[email protected]>
Signed-off-by: Hans Verkuil <[email protected]>
Signed-off-by: Mauro Carvalho Chehab <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts.py')
0 files changed, 0 insertions, 0 deletions