lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <878qf2g0tm.wl-tiwai@suse.de>
Date: Tue, 16 Dec 2025 11:47:49 +0100
From: Takashi Iwai <tiwai@...e.de>
To: Shipei Qu <qu@...knavy.com>
Cc: Jaroslav Kysela <perex@...ex.cz>,
	Takashi Iwai <tiwai@...e.com>,
	alsa-devel@...a-project.org,
	linux-kernel@...r.kernel.org,
	DARKNAVY <vr@...knavy.com>
Subject: Re: [PATCH v2] ALSA: usb-mixer: us16x08: validate meter packet indices

On Tue, 16 Dec 2025 07:01:56 +0100,
Shipei Qu wrote:
> 
> Hi,
> 
> resending with a properly formatted diff (the previous email had a malformed
> patch header). The change itself is the same: while fuzzing a USB gadget that
> emulates a Tascam US-16x08 we found that get_meter_levels_from_urb() in
> mixer_us16x08.c uses a channel index taken directly from the 64-byte meter
> packet to index meter_level[], comp_level[] and master_level[] without any
> bounds checking. A malformed packet can therefore cause out-of-bounds writes in
> the snd_us16x08_meter_store.
> 
> A malicious USB audio device (or USB gadget implementation) that pretends to be
> a US-16x08-compatible interface can trigger this by sending crafted meter
> packets. We have a small USB gadget-based PoC for this behaviour and can share
> it if that would be helpful.
> 
> This driver is used by common distributions (e.g. Ubuntu) when a US-16x08 or
> compatible USB audio device is present. The same pattern is present in current
> mainline kernels.
> 
> This issue was first reported via security@...nel.org. The kernel security team
> explained that, in the upstream threat model, USB endpoints are expected to be
> trusted (i.e. only trusted devices should be bound to drivers), so they
> consider this a normal bug rather than a security vulnerability, and asked us
> to send a fix to the development lists. The patch below adds simple range
> checks before updating these arrays.
> 
> Reported-by: DARKNAVY (@DarkNavyOrg) <vr@...knavy.com>
> Signed-off-by: Shipei Qu <qu@...knavy.com>

Thanks, now it looks applicable, and the code change itself looks
good.

But, could you try to rephrase the patch description above?  It'll be
used directly as the commit message.  So it should be well descriptive
about the bug and the fix, while it should concentrate on the
technical issues.

You can check other commits how they look like, and also see
Documentation/process/submitting-patches.rst.


thanks,

Takashi

> ---
>  sound/usb/mixer_us16x08.c | 20 ++++++++++++++------
>  1 file changed, 14 insertions(+), 6 deletions(-)
> 
> diff --git a/sound/usb/mixer_us16x08.c b/sound/usb/mixer_us16x08.c
> index 1c5712c31..f9df40730 100644
> --- a/sound/usb/mixer_us16x08.c
> +++ b/sound/usb/mixer_us16x08.c
> @@ -655,17 +655,25 @@ static void get_meter_levels_from_urb(int s,
>  	u8 *meter_urb)
>  {
>  	int val = MUC2(meter_urb, s) + (MUC3(meter_urb, s) << 8);
> +	int ch = MUB2(meter_urb, s) - 1;
> +
> +	if (ch < 0)
> +		return;
>  
>  	if (MUA0(meter_urb, s) == 0x61 && MUA1(meter_urb, s) == 0x02 &&
>  		MUA2(meter_urb, s) == 0x04 && MUB0(meter_urb, s) == 0x62) {
> -		if (MUC0(meter_urb, s) == 0x72)
> -			store->meter_level[MUB2(meter_urb, s) - 1] = val;
> -		if (MUC0(meter_urb, s) == 0xb2)
> -			store->comp_level[MUB2(meter_urb, s) - 1] = val;
> +		if (ch < SND_US16X08_MAX_CHANNELS) {
> +			if (MUC0(meter_urb, s) == 0x72)
> +				store->meter_level[ch] = val;
> +			if (MUC0(meter_urb, s) == 0xb2)
> +				store->comp_level[ch] = val;
> +		}
>  	}
>  	if (MUA0(meter_urb, s) == 0x61 && MUA1(meter_urb, s) == 0x02 &&
> -		MUA2(meter_urb, s) == 0x02 && MUB0(meter_urb, s) == 0x62)
> -		store->master_level[MUB2(meter_urb, s) - 1] = val;
> +		MUA2(meter_urb, s) == 0x02 && MUB0(meter_urb, s) == 0x62) {
> +		if (ch < ARRAY_SIZE(store->master_level))
> +			store->master_level[ch] = val;
> +	}
>  }
>  
>  /* Function to retrieve current meter values from the device.
> -- 
> 2.45.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ