From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Google-Smtp-Source: AB8JxZqQTzj8MJ6uaqWHzD6K++Vl3/+1DJnBah68TJSCd2VtCSIVLAHLHnyQ8ODwKb5rbnUDcPuZ ARC-Seal: i=1; a=rsa-sha256; t=1526280706; cv=none; d=google.com; s=arc-20160816; b=TIcofWsBbGRzbf20jDxzkLFDxk01oneZhZDmBZw6mclfXBQHOMVZmk9gkErwIQtpcd iksIg73txghR7TiW98QN2ggo7sUzqYReMjSpfgJWnG+3fuKXAy5MYQITJAf1Hcf/EEso NBGJ8zLQm1wl76PN6FoUkkXpM2ygRhROUUKnaWbHUHwnQ1PrIKwUMtejOyErTIMfwARs x/qwptVT8cRRQlUmZe/2HQgcAUf4yb81qr2fhGrzZzOCkXSkw6VdGlexomaKBd15NRt0 kzdNmuyeRhHLzKYLLuvwTW9vXZHegRq1+VvVF1b/J3WVMaqMHudO83kdOb8to3E9Hi1b n/XA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:user-agent:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=pBOXlOjhR2Gukt0xlSDevqBd1WmJPO/TAXrwcuHuI0Y=; b=ByY1QypSQwCYuzX/Wn84n7k7MKF6vr1sVFNRPiI7ujt7dVqL0ow2Ow+TLQ+RCBnNnx t/fTwoJLY0hoVlKdR02eqKxvHM2oQZv2f2jbso0eS95KYjV+WQUZJF+4UMs2Qtp/DaSO GXokSzHtSSnJGqE041C8ERV7NjJ2QfV1oxnV/rNqVeFbeMSjeTBCgdT8V57UX+u0h65/ mYIe/Yqt9vLTAsGNddWRZANwrLP3g80Olf46tHfWDT1cB5dpumIzARK4yRnE6tMfkhHC Cjz7q5Z0H/CL+34/HkIc7ZGf0TMw/TY88S+eoVILEZjywbXlfAf8AVmJTHBZrMixBaF1 u8bg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hIpGYQqs; spf=pass (google.com: domain of srs0=ywzk=ib=linuxfoundation.org=gregkh@kernel.org designates 198.145.29.99 as permitted sender) smtp.mailfrom=SRS0=ywzk=IB=linuxfoundation.org=gregkh@kernel.org Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hIpGYQqs; spf=pass (google.com: domain of srs0=ywzk=ib=linuxfoundation.org=gregkh@kernel.org designates 198.145.29.99 as permitted sender) smtp.mailfrom=SRS0=ywzk=IB=linuxfoundation.org=gregkh@kernel.org From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andrey Konovalov , Johan Hovold Subject: [PATCH 4.4 26/56] USB: serial: visor: handle potential invalid device configuration Date: Mon, 14 May 2018 08:48:31 +0200 Message-Id: <20180514064757.368589623@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180514064754.853201981@linuxfoundation.org> References: <20180514064754.853201981@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-LABELS: =?utf-8?b?IlxcU2VudCI=?= X-GMAIL-THRID: =?utf-8?q?1600421202448697883?= X-GMAIL-MSGID: =?utf-8?q?1600421317927003734?= X-Mailing-List: linux-kernel@vger.kernel.org List-ID: 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Greg Kroah-Hartman commit 4842ed5bfcb9daf6660537d70503c18d38dbdbb8 upstream. If we get an invalid device configuration from a palm 3 type device, we might incorrectly parse things, and we have the potential to crash in "interesting" ways. Fix this up by verifying the size of the configuration passed to us by the device, and only if it is correct, will we handle it. Note that this also fixes an information leak of slab data. Reported-by: Andrey Konovalov Reviewed-by: Andrey Konovalov Signed-off-by: Greg Kroah-Hartman [ johan: add comment about the info leak ] Cc: stable Signed-off-by: Johan Hovold Signed-off-by: Greg Kroah-Hartman --- drivers/usb/serial/visor.c | 69 ++++++++++++++++++++++----------------------- 1 file changed, 35 insertions(+), 34 deletions(-) --- a/drivers/usb/serial/visor.c +++ b/drivers/usb/serial/visor.c @@ -338,47 +338,48 @@ static int palm_os_3_probe(struct usb_se goto exit; } - if (retval == sizeof(*connection_info)) { - connection_info = (struct visor_connection_info *) - transfer_buffer; - - num_ports = le16_to_cpu(connection_info->num_ports); - for (i = 0; i < num_ports; ++i) { - switch ( - connection_info->connections[i].port_function_id) { - case VISOR_FUNCTION_GENERIC: - string = "Generic"; - break; - case VISOR_FUNCTION_DEBUGGER: - string = "Debugger"; - break; - case VISOR_FUNCTION_HOTSYNC: - string = "HotSync"; - break; - case VISOR_FUNCTION_CONSOLE: - string = "Console"; - break; - case VISOR_FUNCTION_REMOTE_FILE_SYS: - string = "Remote File System"; - break; - default: - string = "unknown"; - break; - } - dev_info(dev, "%s: port %d, is for %s use\n", - serial->type->description, - connection_info->connections[i].port, string); - } + if (retval != sizeof(*connection_info)) { + dev_err(dev, "Invalid connection information received from device\n"); + retval = -ENODEV; + goto exit; } - /* - * Handle devices that report invalid stuff here. - */ + + connection_info = (struct visor_connection_info *)transfer_buffer; + + num_ports = le16_to_cpu(connection_info->num_ports); + + /* Handle devices that report invalid stuff here. */ if (num_ports == 0 || num_ports > 2) { dev_warn(dev, "%s: No valid connect info available\n", serial->type->description); num_ports = 2; } + for (i = 0; i < num_ports; ++i) { + switch (connection_info->connections[i].port_function_id) { + case VISOR_FUNCTION_GENERIC: + string = "Generic"; + break; + case VISOR_FUNCTION_DEBUGGER: + string = "Debugger"; + break; + case VISOR_FUNCTION_HOTSYNC: + string = "HotSync"; + break; + case VISOR_FUNCTION_CONSOLE: + string = "Console"; + break; + case VISOR_FUNCTION_REMOTE_FILE_SYS: + string = "Remote File System"; + break; + default: + string = "unknown"; + break; + } + dev_info(dev, "%s: port %d, is for %s use\n", + serial->type->description, + connection_info->connections[i].port, string); + } dev_info(dev, "%s: Number of ports: %d\n", serial->type->description, num_ports);