Merge "[RESTRICT AUTOMERGE] Fix WVCryptoPlugin use after free vulnerability." into oc-mr1-dev

This commit is contained in:
Edwin Wong
2021-04-06 22:27:14 +00:00
committed by Android (Google) Code Review
3 changed files with 15 additions and 3 deletions

View File

@@ -68,6 +68,8 @@ LOCAL_SHARED_LIBRARIES := \
libhidlmemory \ libhidlmemory \
liblog liblog
LOCAL_CFLAGS := -Wthread-safety
LOCAL_MODULE := libwvdrmcryptoplugin_hidl LOCAL_MODULE := libwvdrmcryptoplugin_hidl
LOCAL_PROPRIETARY_MODULE := true LOCAL_PROPRIETARY_MODULE := true

View File

@@ -5,9 +5,12 @@
#ifndef WV_CRYPTO_PLUGIN_H_ #ifndef WV_CRYPTO_PLUGIN_H_
#define WV_CRYPTO_PLUGIN_H_ #define WV_CRYPTO_PLUGIN_H_
#include <android-base/thread_annotations.h>
#include <android/hardware/drm/1.0/ICryptoPlugin.h> #include <android/hardware/drm/1.0/ICryptoPlugin.h>
#include <android/hidl/memory/1.0/IMemory.h> #include <android/hidl/memory/1.0/IMemory.h>
#include <mutex>
#include "wv_content_decryption_module.h" #include "wv_content_decryption_module.h"
#include "WVTypes.h" #include "WVTypes.h"
@@ -58,13 +61,13 @@ struct WVCryptoPlugin : public ICryptoPlugin {
const SharedBuffer& source, const SharedBuffer& source,
uint64_t offset, uint64_t offset,
const DestinationBuffer& destination, const DestinationBuffer& destination,
decrypt_cb _hidl_cb) override; decrypt_cb _hidl_cb) override NO_THREAD_SAFETY_ANALYSIS; // use unique_lock
private: private:
WVDRM_DISALLOW_COPY_AND_ASSIGN_AND_NEW(WVCryptoPlugin); WVDRM_DISALLOW_COPY_AND_ASSIGN_AND_NEW(WVCryptoPlugin);
wvcdm::CdmSessionId mSessionId; wvcdm::CdmSessionId mSessionId;
std::map<uint32_t, sp<IMemory> > mSharedBufferMap; std::map<uint32_t, sp<IMemory> > mSharedBufferMap GUARDED_BY(mSharedBufferLock);
sp<wvcdm::WvContentDecryptionModule> const mCDM; sp<wvcdm::WvContentDecryptionModule> const mCDM;
@@ -74,6 +77,8 @@ struct WVCryptoPlugin : public ICryptoPlugin {
static wvcdm::CdmResponseType countEncryptedBlocksInPatternedRange( static wvcdm::CdmResponseType countEncryptedBlocksInPatternedRange(
size_t range, const Pattern& pattern, uint64_t* result); size_t range, const Pattern& pattern, uint64_t* result);
static void incrementIV(uint64_t increaseBy, std::vector<uint8_t>* ivPtr); static void incrementIV(uint64_t increaseBy, std::vector<uint8_t>* ivPtr);
std::mutex mSharedBufferLock;
}; };
} // namespace widevine } // namespace widevine

View File

@@ -98,6 +98,8 @@ Return<void> WVCryptoPlugin::setSharedBufferBase(
sp<IMemory> hidlMemory = mapMemory(base); sp<IMemory> hidlMemory = mapMemory(base);
ALOGE_IF(hidlMemory == nullptr, "mapMemory returns nullptr"); ALOGE_IF(hidlMemory == nullptr, "mapMemory returns nullptr");
std::lock_guard<std::mutex> shared_buffer_lock(mSharedBufferLock);
// allow mapMemory to return nullptr // allow mapMemory to return nullptr
mSharedBufferMap[bufferId] = hidlMemory; mSharedBufferMap[bufferId] = hidlMemory;
return Void(); return Void();
@@ -114,7 +116,7 @@ Return<void> WVCryptoPlugin::decrypt(
uint64_t offset, uint64_t offset,
const DestinationBuffer& destination, const DestinationBuffer& destination,
decrypt_cb _hidl_cb) { decrypt_cb _hidl_cb) {
std::unique_lock<std::mutex> lock(mSharedBufferLock);
if (mSharedBufferMap.find(source.bufferId) == mSharedBufferMap.end()) { if (mSharedBufferMap.find(source.bufferId) == mSharedBufferMap.end()) {
_hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0, _hidl_cb(Status::ERROR_DRM_CANNOT_HANDLE, 0,
"source decrypt buffer base not set"); "source decrypt buffer base not set");
@@ -185,6 +187,9 @@ Return<void> WVCryptoPlugin::decrypt(
destPtr = static_cast<void *>(handle); destPtr = static_cast<void *>(handle);
} }
// release mSharedBufferLock
lock.unlock();
// Calculate the output buffer size and determine if any subsamples are // Calculate the output buffer size and determine if any subsamples are
// encrypted. // encrypted.
size_t destSize = 0; size_t destSize = 0;