Input: xpad - validate USB endpoint count during probe
authorCameron Gutman <aicommander@gmail.com>
Wed, 29 Jun 2016 16:51:35 +0000 (09:51 -0700)
committerSasha Levin <alexander.levin@verizon.com>
Wed, 3 Aug 2016 15:38:19 +0000 (11:38 -0400)
[ Upstream commit caca925fca4fb30c67be88cacbe908eec6721e43 ]

This prevents a malicious USB device from causing an oops.

Signed-off-by: Cameron Gutman <aicommander@gmail.com>
Cc: stable@vger.kernel.org
Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
Signed-off-by: Sasha Levin <alexander.levin@verizon.com>
drivers/input/joystick/xpad.c

index 61c7611563712d9cfc829217701061af4bcdd3fa..a450c4ee1217eed0f3dffed97e885a9070559d9a 100644 (file)
@@ -1025,6 +1025,9 @@ static int xpad_probe(struct usb_interface *intf, const struct usb_device_id *id
        int ep_irq_in_idx;
        int i, error;
 
+       if (intf->cur_altsetting->desc.bNumEndpoints != 2)
+               return -ENODEV;
+
        for (i = 0; xpad_device[i].idVendor; i++) {
                if ((le16_to_cpu(udev->descriptor.idVendor) == xpad_device[i].idVendor) &&
                    (le16_to_cpu(udev->descriptor.idProduct) == xpad_device[i].idProduct))