summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMa Ke <make_ruc2021@163.com>2023-09-18 10:40:59 +0800
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2023-10-25 11:16:55 +0200
commita9856853173eb074ba9038c9da94f173e45e9564 (patch)
tree9410211b8a87376ed1c012485f5ed90770c53014
parent79700b56f17ddc28ca9f2b4c63d8dca288754897 (diff)
downloadlinux-a9856853173eb074ba9038c9da94f173e45e9564.tar.gz
linux-a9856853173eb074ba9038c9da94f173e45e9564.tar.bz2
linux-a9856853173eb074ba9038c9da94f173e45e9564.zip
HID: holtek: fix slab-out-of-bounds Write in holtek_kbd_input_event
[ Upstream commit ffe3b7837a2bb421df84d0177481db9f52c93a71 ] There is a slab-out-of-bounds Write bug in hid-holtek-kbd driver. The problem is the driver assumes the device must have an input but some malicious devices violate this assumption. Fix this by checking hid_device's input is non-empty before its usage. Signed-off-by: Ma Ke <make_ruc2021@163.com> Signed-off-by: Jiri Kosina <jkosina@suse.cz> Signed-off-by: Sasha Levin <sashal@kernel.org>
-rw-r--r--drivers/hid/hid-holtek-kbd.c4
1 files changed, 4 insertions, 0 deletions
diff --git a/drivers/hid/hid-holtek-kbd.c b/drivers/hid/hid-holtek-kbd.c
index 2f8eb6639744..72788ca260e0 100644
--- a/drivers/hid/hid-holtek-kbd.c
+++ b/drivers/hid/hid-holtek-kbd.c
@@ -133,6 +133,10 @@ static int holtek_kbd_input_event(struct input_dev *dev, unsigned int type,
return -ENODEV;
boot_hid = usb_get_intfdata(boot_interface);
+ if (list_empty(&boot_hid->inputs)) {
+ hid_err(hid, "no inputs found\n");
+ return -ENODEV;
+ }
boot_hid_input = list_first_entry(&boot_hid->inputs,
struct hid_input, list);