Commit fb32c1f0 authored by Santosh's avatar Santosh Committed by Ganesh Chandra Lanka
Browse files

adsprpc: Handle UAF scenario in put_args



Currently, the DSP updates header buffers with unused DMA handle fds.
In the put_args section, if any DMA handle FDs are present in the
header buffer, the corresponding map is freed. However, since the
header buffer is exposed to users in unsigned PD, users can update
invalid FDs. If this invalid FD matches with any FD that is already
in use, it could lead to a use-after-free (UAF) vulnerability.
As a solution,add DMA handle references for DMA FDs, and the map for
the FD will be freed only when a reference is found.

Acked-by: default avatarOm Deore <quic_odeore@quicinc.com>
Change-Id: Ifc9a2adaeacea72dc1725a8cbcbd87724ef91d93
Signed-off-by: default avatarSantosh <quic_ssakore@quicinc.com>
(cherry picked from commit 6a3e98995be810bdb3693aa7f00ade95a73cf44e)
parent 77e233c7
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please to comment