Commit 875115b
Input: ims-pcu - fix heap-buffer-overflow in ims_pcu_process_data()
The `ims_pcu_process_data()` processes incoming URB data byte by byte.
However, it fails to check if the `read_pos` index exceeds
IMS_PCU_BUF_SIZE.
If a malicious USB device sends a packet larger than IMS_PCU_BUF_SIZE,
`read_pos` will increment indefinitely. Moreover, since `read_pos` is
located immediately after `read_buf`, the attacker can overwrite
`read_pos` itself to arbitrarily control the index.
This manipulated `read_pos` is subsequently used in
`ims_pcu_handle_response()` to copy data into `cmd_buf`, leading to a
heap buffer overflow.
Specifically, an attacker can overwrite the `cmd_done.wait.head` located
at offset 136 relative to `cmd_buf` in the `ims_pcu_handle_response()`.
Consequently, when the driver calls `complete(&pcu->cmd_done)`, it
triggers a control flow hijack by using the manipulated pointer.
Fix this by adding a bounds check for `read_pos` before writing to
`read_buf`. If the packet is too long, discard it, log a warning,
and reset the parser state.
Fixes: 628329d ("Input: add IMS Passenger Control Unit driver")
Co-developed-by: Sanghoon Choi <[email protected]>
Signed-off-by: Sanghoon Choi <[email protected]>
Signed-off-by: Seungjin Bae <[email protected]>
Link: https://patch.msgid.link/[email protected]
[dtor: factor out resetting packet state, reset checksum as well]
Signed-off-by: Dmitry Torokhov <[email protected]>1 parent f7a78e8 commit 875115b
1 file changed
Lines changed: 26 additions & 6 deletions
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
438 | 438 | | |
439 | 439 | | |
440 | 440 | | |
| 441 | + | |
| 442 | + | |
| 443 | + | |
| 444 | + | |
| 445 | + | |
| 446 | + | |
| 447 | + | |
| 448 | + | |
441 | 449 | | |
442 | 450 | | |
443 | 451 | | |
| |||
450 | 458 | | |
451 | 459 | | |
452 | 460 | | |
| 461 | + | |
| 462 | + | |
| 463 | + | |
| 464 | + | |
| 465 | + | |
| 466 | + | |
| 467 | + | |
| 468 | + | |
453 | 469 | | |
454 | 470 | | |
455 | 471 | | |
| |||
462 | 478 | | |
463 | 479 | | |
464 | 480 | | |
| 481 | + | |
465 | 482 | | |
466 | | - | |
467 | | - | |
468 | | - | |
469 | 483 | | |
470 | 484 | | |
471 | 485 | | |
| |||
485 | 499 | | |
486 | 500 | | |
487 | 501 | | |
488 | | - | |
489 | | - | |
490 | | - | |
| 502 | + | |
491 | 503 | | |
492 | 504 | | |
493 | 505 | | |
| 506 | + | |
| 507 | + | |
| 508 | + | |
| 509 | + | |
| 510 | + | |
| 511 | + | |
| 512 | + | |
| 513 | + | |
494 | 514 | | |
495 | 515 | | |
496 | 516 | | |
| |||
0 commit comments