From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DB61F22DFBE; Mon, 31 Mar 2025 14:54:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743432871; cv=none; b=btgpqEkPnXEvzF+OgOeY2wXTd1QGfZUVUyL7y063FOVSQrGm8uybaRpzGqO3lMDKGbXGMZImt0HWW3up1+FO4exdL3End/jWS9PNd9IvhupvQbCB4fqPw+QSvxnBvXZPn0ViPE+S3uot1uDD2OcNH2iBumOK5Mbe2rexVBYo6SM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743432871; c=relaxed/simple; bh=S6y4x2Dy0+A5U6tconAysDu/dhTuwtwV+TzuTjZj4eE=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version:Content-Type; b=lzXpBmB3UVGptSrrDa2W3lsOcHDs5M/FeP2SPOMiJUSIly8WVIXCyBvnMlLMKJkvwwHiTl++vnuG92fnotqKUXzHplKRU3OK52XdCQu94GNP51OfJMZnHLZGnAVvYl9WeZoYgkA91lOiwByagqlejQ+CDuyHtnmUfGJGRv35IVI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=Iz+C7Fec; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Iz+C7Fec" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 26918C4CEE9; Mon, 31 Mar 2025 14:54:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1743432870; bh=S6y4x2Dy0+A5U6tconAysDu/dhTuwtwV+TzuTjZj4eE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Iz+C7FecuZGk0Xa71gqG49gqSwhIuUQvJWCXEKFpdu9u9N7PjPMXHagpIkvXkzW7e oXy5hTK+djcnMmJbDhLL98NPoxiYQ4oWtOR6wJ8MXfwHOivQnwUJWlaWAkf8Lx1mag 8NF5n4R9l/Jx7L/AdK3OAQatHzgaGcGn1/qWOEQiUPWyd3ousu1LUuhXQus/QiTW1D iw+c2EHzc6ZktuYtNNFhn/+eIw/k+Qn1EwC8wSaLev3wws6Us0ACA0tbi3ErcF9NLv o4ccltqHPLDn3RM8l67CFTLuCXblRpI2S45Yn66G0D5oI/w5WwFyBz1AJLT5IJWgDU AZTD7uRHNmBwg== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: =?UTF-8?q?Tomasz=20Paku=C5=82a?= , Nolan Nicholson , =?UTF-8?q?Tomasz=20Paku=C5=82a?= , =?UTF-8?q?Micha=C5=82=20Kope=C4=87?= , Paul Dino Jones , =?UTF-8?q?Crist=C3=B3ferson=20Bueno?= , Pablo Cisneros , Jiri Kosina , Sasha Levin , jikos@kernel.org, bentiss@kernel.org, linux-usb@vger.kernel.org, linux-input@vger.kernel.org Subject: [PATCH AUTOSEL 6.13 12/24] HID: pidff: Fix null pointer dereference in pidff_find_fields Date: Mon, 31 Mar 2025 10:53:52 -0400 Message-Id: <20250331145404.1705141-12-sashal@kernel.org> X-Mailer: git-send-email 2.39.5 In-Reply-To: <20250331145404.1705141-1-sashal@kernel.org> References: <20250331145404.1705141-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: linux-input@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 X-stable: review X-Patchwork-Hint: Ignore X-stable-base: Linux 6.13.9 Content-Transfer-Encoding: 8bit From: Tomasz Pakuła [ Upstream commit 22a05462c3d0eee15154faf8d13c49e6295270a5 ] This function triggered a null pointer dereference if used to search for a report that isn't implemented on the device. This happened both for optional and required reports alike. The same logic was applied to pidff_find_special_field and although pidff_init_fields should return an error earlier if one of the required reports is missing, future modifications could change this logic and resurface this possible null pointer dereference again. LKML bug report: https://lore.kernel.org/all/CAL-gK7f5=R0nrrQdPtaZZr1fd-cdAMbDMuZ_NLA8vM0SX+nGSw@mail.gmail.com Reported-by: Nolan Nicholson Signed-off-by: Tomasz Pakuła Reviewed-by: Michał Kopeć Reviewed-by: Paul Dino Jones Tested-by: Paul Dino Jones Tested-by: Cristóferson Bueno Tested-by: Pablo Cisneros Signed-off-by: Jiri Kosina Signed-off-by: Sasha Levin --- drivers/hid/usbhid/hid-pidff.c | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/drivers/hid/usbhid/hid-pidff.c b/drivers/hid/usbhid/hid-pidff.c index 4c94d8cbac43a..25dbed076f530 100644 --- a/drivers/hid/usbhid/hid-pidff.c +++ b/drivers/hid/usbhid/hid-pidff.c @@ -793,6 +793,11 @@ static void pidff_set_autocenter(struct input_dev *dev, u16 magnitude) static int pidff_find_fields(struct pidff_usage *usage, const u8 *table, struct hid_report *report, int count, int strict) { + if (!report) { + pr_debug("pidff_find_fields, null report\n"); + return -1; + } + int i, j, k, found; int return_value = 0; @@ -917,6 +922,11 @@ static int pidff_reports_ok(struct pidff_device *pidff) static struct hid_field *pidff_find_special_field(struct hid_report *report, int usage, int enforce_min) { + if (!report) { + pr_debug("pidff_find_special_field, null report\n"); + return NULL; + } + int i; for (i = 0; i < report->maxfield; i++) { -- 2.39.5