]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
Input: pegasus-notetaker - fix potential out-of-bounds access
authorSeungjin Bae <eeodqql09@gmail.com>
Fri, 17 Oct 2025 22:36:31 +0000 (15:36 -0700)
committerDmitry Torokhov <dmitry.torokhov@gmail.com>
Sat, 18 Oct 2025 01:04:15 +0000 (18:04 -0700)
commit69aeb507312306f73495598a055293fa749d454e
tree403ca9c576429e2818d36664519a0475671cf7e4
parent7363096a5a08f8740c9075ecfc51945375c304bc
Input: pegasus-notetaker - fix potential out-of-bounds access

In the pegasus_notetaker driver, the pegasus_probe() function allocates
the URB transfer buffer using the wMaxPacketSize value from
the endpoint descriptor. An attacker can use a malicious USB descriptor
to force the allocation of a very small buffer.

Subsequently, if the device sends an interrupt packet with a specific
pattern (e.g., where the first byte is 0x80 or 0x42),
the pegasus_parse_packet() function parses the packet without checking
the allocated buffer size. This leads to an out-of-bounds memory access.

Fixes: 1afca2b66aac ("Input: add Pegasus Notetaker tablet driver")
Signed-off-by: Seungjin Bae <eeodqql09@gmail.com>
Link: https://lore.kernel.org/r/20251007214131.3737115-2-eeodqql09@gmail.com
Cc: stable@vger.kernel.org
Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
drivers/input/tablet/pegasus_notetaker.c