]> git.ipfire.org Git - thirdparty/linux.git/commitdiff
ASoC: SOF: topology: reject invalid vendor array size in token parser
authorCássio Gabriel <cassiogabrielcontato@gmail.com>
Fri, 20 Mar 2026 00:45:26 +0000 (21:45 -0300)
committerMark Brown <broonie@kernel.org>
Fri, 20 Mar 2026 12:52:41 +0000 (12:52 +0000)
sof_parse_token_sets() accepts array->size values that can be invalid
for a vendor tuple array header. In particular, a zero size does not
advance the parser state and can lead to non-progress parsing on
malformed topology data.

Validate array->size against the minimum header size and reject values
smaller than sizeof(*array) before parsing. This preserves behavior for
valid topologies and hardens malformed-input handling.

Signed-off-by: Cássio Gabriel <cassiogabrielcontato@gmail.com>
Acked-by: Peter Ujfalusi <peter.ujfalusi@linux.intel.com>
Link: https://patch.msgid.link/20260319-sof-topology-array-size-fix-v1-1-f9191b16b1b7@gmail.com
Signed-off-by: Mark Brown <broonie@kernel.org>
sound/soc/sof/topology.c

index 18e2401152c816afe15969d0f5eed66114a8436f..35200d801fb739e9a73432b92570366b41650ac9 100644 (file)
@@ -736,7 +736,7 @@ static int sof_parse_token_sets(struct snd_soc_component *scomp,
                asize = le32_to_cpu(array->size);
 
                /* validate asize */
-               if (asize < 0) { /* FIXME: A zero-size array makes no sense */
+               if (asize < sizeof(*array)) {
                        dev_err(scomp->dev, "error: invalid array size 0x%x\n",
                                asize);
                        return -EINVAL;