]> Git Repo - J-linux.git/commitdiff
usb: gadget: configfs: Prevent OOB read/write in usb_string_copy()
authorLee Jones <[email protected]>
Fri, 5 Jul 2024 07:43:39 +0000 (08:43 +0100)
committerGreg Kroah-Hartman <[email protected]>
Fri, 5 Jul 2024 07:57:24 +0000 (09:57 +0200)
Userspace provided string 's' could trivially have the length zero. Left
unchecked this will firstly result in an OOB read in the form
`if (str[0 - 1] == '\n') followed closely by an OOB write in the form
`str[0 - 1] = '\0'`.

There is already a validating check to catch strings that are too long.
Let's supply an additional check for invalid strings that are too short.

Signed-off-by: Lee Jones <[email protected]>
Cc: stable <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Greg Kroah-Hartman <[email protected]>
drivers/usb/gadget/configfs.c

index ce3cfa1f36f516d117e0095a4ab47a0abd9b5c48..0e7c1e947c0a0e4d84797c319168ebe45fd98c54 100644 (file)
@@ -115,9 +115,12 @@ static int usb_string_copy(const char *s, char **s_copy)
        int ret;
        char *str;
        char *copy = *s_copy;
+
        ret = strlen(s);
        if (ret > USB_MAX_STRING_LEN)
                return -EOVERFLOW;
+       if (ret < 1)
+               return -EINVAL;
 
        if (copy) {
                str = copy;
This page took 0.055531 seconds and 4 git commands to generate.