]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
HID: logitech-dj: Prevent REPORT_ID_DJ_SHORT related user initiated OOB write
authorLee Jones <lee@kernel.org>
Tue, 24 Mar 2026 14:36:44 +0000 (14:36 +0000)
committerJiri Kosina <jkosina@suse.com>
Thu, 9 Apr 2026 15:35:52 +0000 (17:35 +0200)
logi_dj_recv_send_report() assumes that all incoming REPORT_ID_DJ_SHORT
reports are 14 Bytes (DJREPORT_SHORT_LENGTH - 1) long.  It uses that
assumption to load the associated field's 'value' array with 14 Bytes of
data.  However, if a malicious user only sends say 1 Byte of data,
'report_count' will be 1 and only 1 Byte of memory will be allocated to
the 'value' Byte array.  When we come to populate 'value[1-13]' we will
experience an OOB write.

Signed-off-by: Lee Jones <lee@kernel.org>
Signed-off-by: Jiri Kosina <jkosina@suse.com>
drivers/hid/hid-logitech-dj.c

index 93f39d3e4e1b071743574f465a1e1287a496de65..838c6de9a921c534cf28e167be32192f7ba5601d 100644 (file)
@@ -1859,6 +1859,7 @@ static int logi_dj_probe(struct hid_device *hdev,
                         const struct hid_device_id *id)
 {
        struct hid_report_enum *input_report_enum;
+       struct hid_report_enum *output_report_enum;
        struct hid_report *rep;
        struct dj_receiver_dev *djrcv_dev;
        struct usb_interface *intf;
@@ -1903,6 +1904,15 @@ static int logi_dj_probe(struct hid_device *hdev,
                }
        }
 
+       output_report_enum = &hdev->report_enum[HID_OUTPUT_REPORT];
+       rep = output_report_enum->report_id_hash[REPORT_ID_DJ_SHORT];
+
+       if (rep->maxfield < 1 || rep->field[0]->report_count != DJREPORT_SHORT_LENGTH - 1) {
+               hid_err(hdev, "Expected size of DJ short report is %d, but got %d",
+                       DJREPORT_SHORT_LENGTH - 1, rep->field[0]->report_count);
+               return -EINVAL;
+       }
+
        input_report_enum = &hdev->report_enum[HID_INPUT_REPORT];
 
        /* no input reports, bail out */