提交 412f3010 编写于 作者: K Kees Cook 提交者: Jiri Kosina

HID: pantherlord: validate output report details

A HID device could send a malicious output report that would cause the
pantherlord HID driver to write beyond the output report allocation
during initialization, causing a heap overflow:

[  310.939483] usb 1-1: New USB device found, idVendor=0e8f, idProduct=0003
...
[  315.980774] BUG kmalloc-192 (Tainted: G        W   ): Redzone overwritten

CVE-2013-2892
Signed-off-by: NKees Cook <keescook@chromium.org>
Cc: stable@kernel.org
Signed-off-by: NJiri Kosina <jkosina@suse.cz>
上级 8c89cc17
...@@ -132,8 +132,14 @@ static int plff_init(struct hid_device *hid) ...@@ -132,8 +132,14 @@ static int plff_init(struct hid_device *hid)
strong = &report->field[0]->value[2]; strong = &report->field[0]->value[2];
weak = &report->field[0]->value[3]; weak = &report->field[0]->value[3];
debug("detected single-field device"); debug("detected single-field device");
} else if (report->maxfield >= 4 && report->field[0]->maxusage == 1 && } else if (report->field[0]->maxusage == 1 &&
report->field[0]->usage[0].hid == (HID_UP_LED | 0x43)) { report->field[0]->usage[0].hid ==
(HID_UP_LED | 0x43) &&
report->maxfield >= 4 &&
report->field[0]->report_count >= 1 &&
report->field[1]->report_count >= 1 &&
report->field[2]->report_count >= 1 &&
report->field[3]->report_count >= 1) {
report->field[0]->value[0] = 0x00; report->field[0]->value[0] = 0x00;
report->field[1]->value[0] = 0x00; report->field[1]->value[0] = 0x00;
strong = &report->field[2]->value[0]; strong = &report->field[2]->value[0];
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册