]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
Input: xpad - validate USB endpoint count during probe
authorCameron Gutman <aicommander@gmail.com>
Wed, 29 Jun 2016 16:51:35 +0000 (09:51 -0700)
committerBen Hutchings <ben@decadent.org.uk>
Sun, 20 Nov 2016 01:16:43 +0000 (01:16 +0000)
commit caca925fca4fb30c67be88cacbe908eec6721e43 upstream.

This prevents a malicious USB device from causing an oops.

Signed-off-by: Cameron Gutman <aicommander@gmail.com>
Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
drivers/input/joystick/xpad.c

index e2c65596471110ffc799dbc18ce0cc753dae6b25..a137a37381284c38fe87d1613094f3c6422398d9 100644 (file)
@@ -883,6 +883,9 @@ static int xpad_probe(struct usb_interface *intf, const struct usb_device_id *id
        struct usb_endpoint_descriptor *ep_irq_in;
        int i, error;
 
+       if (intf->cur_altsetting->desc.bNumEndpoints != 2)
+               return -ENODEV;
+
        for (i = 0; xpad_device[i].idVendor; i++) {
                if ((le16_to_cpu(udev->descriptor.idVendor) == xpad_device[i].idVendor) &&
                    (le16_to_cpu(udev->descriptor.idProduct) == xpad_device[i].idProduct))