[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1466693987-15363-1-git-send-email-sbauer@plzdonthack.me>
Date: Thu, 23 Jun 2016 08:59:47 -0600
From: Scott Bauer <sbauer@...donthack.me>
To: jikos@...nel.org
Cc: benjamin.tissoires@...hat.com, wmealing@...hat.com,
linux-usb@...r.kernel.org, linux-input@...r.kernel.org,
linux-kernel@...r.kernel.org, torvalds@...ux-foundation.org,
Scott Bauer <sbauer@...donthack.me>
Subject: [PATCH] Validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands.
This patch validates the num_values parameter from userland during
the HIDIOCGUSAGES and HIDIOCSUSAGES commands. Previously, if the
report id was set to HID_REPORT_ID_UNKNOWN, we would fail to
validate the num_values parameter leading to a heap overflow.
Signed-off-by: Scott Bauer <sbauer@...donthack.me>
---
drivers/hid/usbhid/hiddev.c | 10 +++++-----
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/drivers/hid/usbhid/hiddev.c b/drivers/hid/usbhid/hiddev.c
index 2f1ddca..700145b 100644
--- a/drivers/hid/usbhid/hiddev.c
+++ b/drivers/hid/usbhid/hiddev.c
@@ -516,13 +516,13 @@ static noinline int hiddev_ioctl_usage(struct hiddev *hiddev, unsigned int cmd,
goto inval;
} else if (uref->usage_index >= field->report_count)
goto inval;
-
- else if ((cmd == HIDIOCGUSAGES || cmd == HIDIOCSUSAGES) &&
- (uref_multi->num_values > HID_MAX_MULTI_USAGES ||
- uref->usage_index + uref_multi->num_values > field->report_count))
- goto inval;
}
+ if ((cmd == HIDIOCGUSAGES || cmd == HIDIOCSUSAGES) &&
+ (uref_multi->num_values > HID_MAX_MULTI_USAGES ||
+ uref->usage_index + uref_multi->num_values > field->report_count))
+ goto inval;
+
switch (cmd) {
case HIDIOCGUSAGE:
uref->value = field->value[uref->usage_index];
--
1.9.1
Powered by blists - more mailing lists