]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
authorBenoît Sevens <bsevens@google.com>
Wed, 20 Nov 2024 12:41:44 +0000 (12:41 +0000)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 14 Dec 2024 18:51:12 +0000 (19:51 +0100)
commit b909df18ce2a998afef81d58bbd1a05dc0788c40 upstream.

A bogus device can provide a bNumConfigurations value that exceeds the
initial value used in usb_get_configuration for allocating dev->config.

This can lead to out-of-bounds accesses later, e.g. in
usb_destroy_configuration.

Signed-off-by: Benoît Sevens <bsevens@google.com>
Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
Cc: stable@kernel.org
Link: https://patch.msgid.link/20241120124144.3814457-1-bsevens@google.com
Signed-off-by: Takashi Iwai <tiwai@suse.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
sound/usb/quirks.c

index 1d620c2f41a35445a667ce607518ca7dc5e54fdb..9d98a0e6a9f4c4fbdaa49041b850088edc86dd16 100644 (file)
@@ -591,6 +591,7 @@ int snd_usb_create_quirk(struct snd_usb_audio *chip,
 static int snd_usb_extigy_boot_quirk(struct usb_device *dev, struct usb_interface *intf)
 {
        struct usb_host_config *config = dev->actconfig;
+       struct usb_device_descriptor new_device_descriptor;
        int err;
 
        if (le16_to_cpu(get_cfg_desc(config)->wTotalLength) == EXTIGY_FIRMWARE_SIZE_OLD ||
@@ -602,10 +603,14 @@ static int snd_usb_extigy_boot_quirk(struct usb_device *dev, struct usb_interfac
                if (err < 0)
                        dev_dbg(&dev->dev, "error sending boot message: %d\n", err);
                err = usb_get_descriptor(dev, USB_DT_DEVICE, 0,
-                               &dev->descriptor, sizeof(dev->descriptor));
-               config = dev->actconfig;
+                               &new_device_descriptor, sizeof(new_device_descriptor));
                if (err < 0)
                        dev_dbg(&dev->dev, "error usb_get_descriptor: %d\n", err);
+               if (new_device_descriptor.bNumConfigurations > dev->descriptor.bNumConfigurations)
+                       dev_dbg(&dev->dev, "error too large bNumConfigurations: %d\n",
+                               new_device_descriptor.bNumConfigurations);
+               else
+                       memcpy(&dev->descriptor, &new_device_descriptor, sizeof(dev->descriptor));
                err = usb_reset_configuration(dev);
                if (err < 0)
                        dev_dbg(&dev->dev, "error usb_reset_configuration: %d\n", err);
@@ -937,6 +942,7 @@ static void mbox2_setup_48_24_magic(struct usb_device *dev)
 static int snd_usb_mbox2_boot_quirk(struct usb_device *dev)
 {
        struct usb_host_config *config = dev->actconfig;
+       struct usb_device_descriptor new_device_descriptor;
        int err;
        u8 bootresponse[0x12];
        int fwsize;
@@ -972,10 +978,14 @@ static int snd_usb_mbox2_boot_quirk(struct usb_device *dev)
        dev_dbg(&dev->dev, "device initialised!\n");
 
        err = usb_get_descriptor(dev, USB_DT_DEVICE, 0,
-               &dev->descriptor, sizeof(dev->descriptor));
-       config = dev->actconfig;
+               &new_device_descriptor, sizeof(new_device_descriptor));
        if (err < 0)
                dev_dbg(&dev->dev, "error usb_get_descriptor: %d\n", err);
+       if (new_device_descriptor.bNumConfigurations > dev->descriptor.bNumConfigurations)
+               dev_dbg(&dev->dev, "error too large bNumConfigurations: %d\n",
+                       new_device_descriptor.bNumConfigurations);
+       else
+               memcpy(&dev->descriptor, &new_device_descriptor, sizeof(dev->descriptor));
 
        err = usb_reset_configuration(dev);
        if (err < 0)
@@ -1020,7 +1030,6 @@ static int snd_usb_axefx3_boot_quirk(struct usb_device *dev)
        return 0;
 }
 
-
 #define MICROBOOK_BUF_SIZE 128
 
 static int snd_usb_motu_microbookii_communicate(struct usb_device *dev, u8 *buf,