Input: xpad - validate USB endpoint count during probe
authorCameron Gutman <aicommander@gmail.com>
Wed, 29 Jun 2016 16:51:35 +0000 (09:51 -0700)
committerWilly Tarreau <w@1wt.eu>
Sun, 21 Aug 2016 21:22:42 +0000 (23:22 +0200)
commit caca925fca4fb30c67be88cacbe908eec6721e43 upstream.

This prevents a malicious USB device from causing an oops.

Signed-off-by: Cameron Gutman <aicommander@gmail.com>
Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Willy Tarreau <w@1wt.eu>
drivers/input/joystick/xpad.c

index 856c1b03e22d2be8326f1aed373a3fb1f180dae5..685e125d6366001a2c2442e105a2961a84b8c3c4 100644 (file)
@@ -843,6 +843,9 @@ static int xpad_probe(struct usb_interface *intf, const struct usb_device_id *id
        struct usb_endpoint_descriptor *ep_irq_in;
        int i, error;
 
+       if (intf->cur_altsetting->desc.bNumEndpoints != 2)
+               return -ENODEV;
+
        for (i = 0; xpad_device[i].idVendor; i++) {
                if ((le16_to_cpu(udev->descriptor.idVendor) == xpad_device[i].idVendor) &&
                    (le16_to_cpu(udev->descriptor.idProduct) == xpad_device[i].idProduct))