Home
last modified time | relevance | path

Searched hist:d1205033 (Results 1 – 1 of 1) sorted by relevance

/openbmc/linux/drivers/usb/gadget/
H A Dconfigfs.cd1205033 Fri Jul 05 02:43:39 CDT 2024 Lee Jones <lee@kernel.org> usb: gadget: configfs: Prevent OOB read/write in usb_string_copy()

commit 6d3c721e686ea6c59e18289b400cc95c76e927e0 upstream.

Userspace provided string 's' could trivially have the length zero. Left
unchecked this will firstly result in an OOB read in the form
`if (str[0 - 1] == '\n') followed closely by an OOB write in the form
`str[0 - 1] = '\0'`.

There is already a validating check to catch strings that are too long.
Let's supply an additional check for invalid strings that are too short.

Signed-off-by: Lee Jones <lee@kernel.org>
Cc: stable <stable@kernel.org>
Link: https://lore.kernel.org/r/20240705074339.633717-1-lee@kernel.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>