Commit 92461f5d authored by Johan Hovold's avatar Johan Hovold Committed by Dmitry Torokhov
Browse files

Input: sur40 - validate number of endpoints before using them



Make sure to check the number of endpoints to avoid dereferencing a
NULL-pointer or accessing memory that lie beyond the end of the endpoint
array should a malicious device lack the expected endpoints.

Fixes: bdb5c57f ("Input: add sur40 driver for Samsung SUR40... ")
Signed-off-by: default avatarJohan Hovold <johan@kernel.org>
Cc: stable@vger.kernel.org	# 3.13
Signed-off-by: default avatarDmitry Torokhov <dmitry.torokhov@gmail.com>
parent cb1b4946
Loading
Loading
Loading
Loading
+3 −0
Original line number Diff line number Diff line
@@ -527,6 +527,9 @@ static int sur40_probe(struct usb_interface *interface,
	if (iface_desc->desc.bInterfaceClass != 0xFF)
		return -ENODEV;

	if (iface_desc->desc.bNumEndpoints < 5)
		return -ENODEV;

	/* Use endpoint #4 (0x86). */
	endpoint = &iface_desc->endpoint[4].desc;
	if (endpoint->bEndpointAddress != TOUCH_ENDPOINT)