UPSTREAM: USB: iowarrior: fix oops with malicious USB descriptors
authorBadhri Jagan Sridharan <Badhri@google.com>
Tue, 30 Aug 2016 20:37:07 +0000 (13:37 -0700)
committerBadhri Jagan Sridharan <Badhri@google.com>
Tue, 30 Aug 2016 20:41:35 +0000 (13:41 -0700)
commit 4ec0ef3a82125efc36173062a50624550a900ae0 upstream.

The iowarrior driver expects at least one valid endpoint.  If given
malicious descriptors that specify 0 for the number of endpoints,
it will crash in the probe function.  Ensure there is at least
one endpoint on the interface before using it.

The full report of this issue can be found here:
http://seclists.org/bugtraq/2016/Mar/87

BUG: 28242610

Reported-by: Ralf Spenneberg <ralf@spenneberg.net>
Signed-off-by: Josh Boyer <jwboyer@fedoraproject.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Badhri Jagan Sridharan <Badhri@google.com>
Change-Id: If5161c23928e9ef77cb3359cba9b36622b1908df

drivers/usb/misc/iowarrior.c

index c6bfd13f6c92ff416688659b54600026cf382de1..1950e87b4219047908dfdad73fe30650cad7b8ca 100644 (file)
@@ -787,6 +787,12 @@ static int iowarrior_probe(struct usb_interface *interface,
        iface_desc = interface->cur_altsetting;
        dev->product_id = le16_to_cpu(udev->descriptor.idProduct);
 
+       if (iface_desc->desc.bNumEndpoints < 1) {
+               dev_err(&interface->dev, "Invalid number of endpoints\n");
+               retval = -EINVAL;
+               goto error;
+       }
+
        /* set up the endpoint information */
        for (i = 0; i < iface_desc->desc.bNumEndpoints; ++i) {
                endpoint = &iface_desc->endpoint[i].desc;