]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
4.9-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sun, 23 Jan 2022 13:59:26 +0000 (14:59 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sun, 23 Jan 2022 13:59:26 +0000 (14:59 +0100)
added patches:
hid-uhid-fix-worker-destroying-device-without-any-protection.patch
hid-wacom-avoid-using-stale-array-indicies-to-read-contact-count.patch

queue-4.9/hid-uhid-fix-worker-destroying-device-without-any-protection.patch [new file with mode: 0644]
queue-4.9/hid-wacom-avoid-using-stale-array-indicies-to-read-contact-count.patch [new file with mode: 0644]
queue-4.9/series

diff --git a/queue-4.9/hid-uhid-fix-worker-destroying-device-without-any-protection.patch b/queue-4.9/hid-uhid-fix-worker-destroying-device-without-any-protection.patch
new file mode 100644 (file)
index 0000000..86ab97f
--- /dev/null
@@ -0,0 +1,101 @@
+From 4ea5763fb79ed89b3bdad455ebf3f33416a81624 Mon Sep 17 00:00:00 2001
+From: Jann Horn <jannh@google.com>
+Date: Fri, 14 Jan 2022 14:33:30 +0100
+Subject: HID: uhid: Fix worker destroying device without any protection
+
+From: Jann Horn <jannh@google.com>
+
+commit 4ea5763fb79ed89b3bdad455ebf3f33416a81624 upstream.
+
+uhid has to run hid_add_device() from workqueue context while allowing
+parallel use of the userspace API (which is protected with ->devlock).
+But hid_add_device() can fail. Currently, that is handled by immediately
+destroying the associated HID device, without using ->devlock - but if
+there are concurrent requests from userspace, that's wrong and leads to
+NULL dereferences and/or memory corruption (via use-after-free).
+
+Fix it by leaving the HID device as-is in the worker. We can clean it up
+later, either in the UHID_DESTROY command handler or in the ->release()
+handler.
+
+Cc: stable@vger.kernel.org
+Fixes: 67f8ecc550b5 ("HID: uhid: fix timeout when probe races with IO")
+Signed-off-by: Jann Horn <jannh@google.com>
+Signed-off-by: Jiri Kosina <jkosina@suse.cz>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/hid/uhid.c |   29 +++++++++++++++++++++++++----
+ 1 file changed, 25 insertions(+), 4 deletions(-)
+
+--- a/drivers/hid/uhid.c
++++ b/drivers/hid/uhid.c
+@@ -33,11 +33,22 @@
+ struct uhid_device {
+       struct mutex devlock;
++
++      /* This flag tracks whether the HID device is usable for commands from
++       * userspace. The flag is already set before hid_add_device(), which
++       * runs in workqueue context, to allow hid_add_device() to communicate
++       * with userspace.
++       * However, if hid_add_device() fails, the flag is cleared without
++       * holding devlock.
++       * We guarantee that if @running changes from true to false while you're
++       * holding @devlock, it's still fine to access @hid.
++       */
+       bool running;
+       __u8 *rd_data;
+       uint rd_size;
++      /* When this is NULL, userspace may use UHID_CREATE/UHID_CREATE2. */
+       struct hid_device *hid;
+       struct uhid_event input_buf;
+@@ -68,9 +79,18 @@ static void uhid_device_add_worker(struc
+       if (ret) {
+               hid_err(uhid->hid, "Cannot register HID device: error %d\n", ret);
+-              hid_destroy_device(uhid->hid);
+-              uhid->hid = NULL;
++              /* We used to call hid_destroy_device() here, but that's really
++               * messy to get right because we have to coordinate with
++               * concurrent writes from userspace that might be in the middle
++               * of using uhid->hid.
++               * Just leave uhid->hid as-is for now, and clean it up when
++               * userspace tries to close or reinitialize the uhid instance.
++               *
++               * However, we do have to clear the ->running flag and do a
++               * wakeup to make sure userspace knows that the device is gone.
++               */
+               uhid->running = false;
++              wake_up_interruptible(&uhid->report_wait);
+       }
+ }
+@@ -479,7 +499,7 @@ static int uhid_dev_create2(struct uhid_
+       void *rd_data;
+       int ret;
+-      if (uhid->running)
++      if (uhid->hid)
+               return -EALREADY;
+       rd_size = ev->u.create2.rd_size;
+@@ -560,7 +580,7 @@ static int uhid_dev_create(struct uhid_d
+ static int uhid_dev_destroy(struct uhid_device *uhid)
+ {
+-      if (!uhid->running)
++      if (!uhid->hid)
+               return -EINVAL;
+       uhid->running = false;
+@@ -569,6 +589,7 @@ static int uhid_dev_destroy(struct uhid_
+       cancel_work_sync(&uhid->worker);
+       hid_destroy_device(uhid->hid);
++      uhid->hid = NULL;
+       kfree(uhid->rd_data);
+       return 0;
diff --git a/queue-4.9/hid-wacom-avoid-using-stale-array-indicies-to-read-contact-count.patch b/queue-4.9/hid-wacom-avoid-using-stale-array-indicies-to-read-contact-count.patch
new file mode 100644 (file)
index 0000000..3a055c1
--- /dev/null
@@ -0,0 +1,44 @@
+From 20f3cf5f860f9f267a6a6e5642d3d0525edb1814 Mon Sep 17 00:00:00 2001
+From: Jason Gerecke <killertofu@gmail.com>
+Date: Tue, 18 Jan 2022 14:38:41 -0800
+Subject: HID: wacom: Avoid using stale array indicies to read contact count
+
+From: Jason Gerecke <killertofu@gmail.com>
+
+commit 20f3cf5f860f9f267a6a6e5642d3d0525edb1814 upstream.
+
+If we ever see a touch report with contact count data we initialize
+several variables used to read the contact count in the pre-report
+phase. These variables are never reset if we process a report which
+doesn't contain a contact count, however. This can cause the pre-
+report function to trigger a read of arbitrary memory (e.g. NULL
+if we're lucky) and potentially crash the driver.
+
+This commit restores resetting of the variables back to default
+"none" values that were used prior to the commit mentioned
+below.
+
+Link: https://github.com/linuxwacom/input-wacom/issues/276
+Fixes: 003f50ab673c (HID: wacom: Update last_slot_field during pre_report phase)
+CC: stable@vger.kernel.org
+Signed-off-by: Jason Gerecke <jason.gerecke@wacom.com>
+Reviewed-by: Ping Cheng <ping.cheng@wacom.com>
+Signed-off-by: Jiri Kosina <jkosina@suse.cz>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/hid/wacom_wac.c |    4 ++++
+ 1 file changed, 4 insertions(+)
+
+--- a/drivers/hid/wacom_wac.c
++++ b/drivers/hid/wacom_wac.c
+@@ -1693,6 +1693,10 @@ static void wacom_wac_finger_pre_report(
+       struct hid_data* hid_data = &wacom_wac->hid_data;
+       int i;
++      hid_data->cc_report = 0;
++      hid_data->cc_index = -1;
++      hid_data->cc_value_index = -1;
++
+       for (i = 0; i < report->maxfield; i++) {
+               struct hid_field *field = report->field[i];
+               int j;
index 4ff20b45787aadedd890ce21cf009d8aff31c614..7441adcd385055db10b22064211dd8a0af184a7f 100644 (file)
@@ -10,3 +10,5 @@ staging-wlan-ng-avoid-bitwise-vs-logical-or-warning-in-hfa384x_usb_throttlefn.pa
 drm-i915-avoid-bitwise-vs-logical-or-warning-in-snb_wm_latency_quirk.patch
 media-uvcvideo-fix-division-by-zero-at-stream-start.patch
 rtlwifi-rtl8192cu-fix-warning-when-calling-local_irq_restore-with-interrupts-enabled.patch
+hid-uhid-fix-worker-destroying-device-without-any-protection.patch
+hid-wacom-avoid-using-stale-array-indicies-to-read-contact-count.patch