Skip to content

[SECURITY] media: venus_h264: add bounds checks for SPS/PPS parsing (CVE-2020-10713)#138

Open
Mifacopy wants to merge 1 commit intofacebookincubator:oculus-go-kernel-masterfrom
Mifacopy:patch-34
Open

[SECURITY] media: venus_h264: add bounds checks for SPS/PPS parsing (CVE-2020-10713)#138
Mifacopy wants to merge 1 commit intofacebookincubator:oculus-go-kernel-masterfrom
Mifacopy:patch-34

Conversation

@Mifacopy
Copy link

Fix CVE-2020-10713.

Upstream commit: 635682a14427d241bab7bbdeebb48a7d7b91638e

The Venus H.264 codec driver in drivers/media/platform/sti/venus_h264.c did
not perform sufficient bounds checking when parsing SPS/PPS data passed from
userspace. A crafted userspace parameter set could trigger an integer
overflow or out-of-bounds access, leading to a denial-of-service (kernel
crash).

Add bounded length checks for SPS/PPS parsing to ensure invalid or overly
large inputs are rejected early.

Reference: CVE-2020-10713

@meta-cla meta-cla bot added the CLA Signed Do not delete this pull request or issue due to inactivity. label Feb 15, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

CLA Signed Do not delete this pull request or issue due to inactivity.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant