Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp2988906imm; Sun, 1 Jul 2018 09:48:29 -0700 (PDT) X-Google-Smtp-Source: AAOMgpc627PsaVdfSvC/x9kpvCeeJzUmtbxCaBHdn6CNzI2abjEC6+UnelZBqFjYF4uCuyWVEo2Y X-Received: by 2002:a65:5284:: with SMTP id y4-v6mr9358550pgp.283.1530463709593; Sun, 01 Jul 2018 09:48:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530463709; cv=none; d=google.com; s=arc-20160816; b=qqdMBnZmPejdNaX6a4AHkBgSH80NuaLzpbdkToHDCgmzDP50fUbpt9tjDqG/enbNt3 E9zZqsQFKCsjDMIX5zuEHxUKV0VvkIyzsToHIeWw+0QMxp0/p50W1qEu9AbwGJjX+ZVW N3pNh+EFYTOtkOJhjGHLixTJ6Ow98sBRDw8VEJvlYl3YwfO6AqW+LkSJRnPJ6PaWyR3Z p2SNTuL8zkV/yr+uCSDEczdrwif8ESKyLrZDi9W0Kq89GGn8ptMJOKFr++VsYwkUIqBX 1uAJ89LOCEwiE2JAfOlDC9ohf+SUosGxdC3vvtbfxOKSkVrjqlGqU6NQune/cVvgf0+h d9fQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=hbYFgcbVlsbyd1n32Wm59kqq3qLje7uviop95TPQ82o=; b=uHIJj3jwhsEBYNAUKmUqk5bsoYFi4URTC+6ItuEJR42OqnYRCDKIuYhR3wGAoJ7pWu KCn1yDpkpLHhAZ/N+qsDEAs5a+ojbfp0QBbLDPbuPdqZQgYPs0HYs0dKvaZt0gFF1gXm CGmEqeDPSWL/ciDllBCI8+U3YcdltRm+4JzY5rbK3i3BFntk982vw7DNE+KeJfZU4CK4 235+lc/q01nqYJmeAiAhcg6adzC1pyGbaoQ9WSHtULGH7tkj5SmVmN1Y8Rrh5aXUBD7Z GAIobaOvUaDtIiG8fl1EnhLND510ndBu0dA+quzgfkWi4qxxSEAXu4wnlgvj8vVe2VbY AtDA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n5-v6si14390873plk.352.2018.07.01.09.48.15; Sun, 01 Jul 2018 09:48:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1032197AbeGAQpm (ORCPT + 99 others); Sun, 1 Jul 2018 12:45:42 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:38248 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753706AbeGAQph (ORCPT ); Sun, 1 Jul 2018 12:45:37 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 8464EA73; Sun, 1 Jul 2018 16:45:36 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ben Hutchings , Benjamin Tissoires , Dmitry Torokhov Subject: [PATCH 4.17 198/220] Input: elan_i2c_smbus - fix more potential stack buffer overflows Date: Sun, 1 Jul 2018 18:23:42 +0200 Message-Id: <20180701160916.451995436@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180701160908.272447118@linuxfoundation.org> References: <20180701160908.272447118@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.17-stable review patch. If anyone has any objections, please let me know. ------------------ From: Ben Hutchings commit 50fc7b61959af4b95fafce7fe5dd565199e0b61a upstream. Commit 40f7090bb1b4 ("Input: elan_i2c_smbus - fix corrupted stack") fixed most of the functions using i2c_smbus_read_block_data() to allocate a buffer with the maximum block size. However three functions were left unchanged: * In elan_smbus_initialize(), increase the buffer size in the same way. * In elan_smbus_calibrate_result(), the buffer is provided by the caller (calibrate_store()), so introduce a bounce buffer. Also name the result buffer size. * In elan_smbus_get_report(), the buffer is provided by the caller but happens to be the right length. Add a compile-time assertion to ensure this remains the case. Cc: # 3.19+ Signed-off-by: Ben Hutchings Reviewed-by: Benjamin Tissoires Signed-off-by: Dmitry Torokhov Signed-off-by: Greg Kroah-Hartman --- drivers/input/mouse/elan_i2c.h | 2 ++ drivers/input/mouse/elan_i2c_core.c | 2 +- drivers/input/mouse/elan_i2c_smbus.c | 10 ++++++++-- 3 files changed, 11 insertions(+), 3 deletions(-) --- a/drivers/input/mouse/elan_i2c.h +++ b/drivers/input/mouse/elan_i2c.h @@ -27,6 +27,8 @@ #define ETP_DISABLE_POWER 0x0001 #define ETP_PRESSURE_OFFSET 25 +#define ETP_CALIBRATE_MAX_LEN 3 + /* IAP Firmware handling */ #define ETP_PRODUCT_ID_FORMAT_STRING "%d.0" #define ETP_FW_NAME "elan_i2c_" ETP_PRODUCT_ID_FORMAT_STRING ".bin" --- a/drivers/input/mouse/elan_i2c_core.c +++ b/drivers/input/mouse/elan_i2c_core.c @@ -610,7 +610,7 @@ static ssize_t calibrate_store(struct de int tries = 20; int retval; int error; - u8 val[3]; + u8 val[ETP_CALIBRATE_MAX_LEN]; retval = mutex_lock_interruptible(&data->sysfs_mutex); if (retval) --- a/drivers/input/mouse/elan_i2c_smbus.c +++ b/drivers/input/mouse/elan_i2c_smbus.c @@ -56,7 +56,7 @@ static int elan_smbus_initialize(struct i2c_client *client) { u8 check[ETP_SMBUS_HELLOPACKET_LEN] = { 0x55, 0x55, 0x55, 0x55, 0x55 }; - u8 values[ETP_SMBUS_HELLOPACKET_LEN] = { 0, 0, 0, 0, 0 }; + u8 values[I2C_SMBUS_BLOCK_MAX] = {0}; int len, error; /* Get hello packet */ @@ -117,12 +117,16 @@ static int elan_smbus_calibrate(struct i static int elan_smbus_calibrate_result(struct i2c_client *client, u8 *val) { int error; + u8 buf[I2C_SMBUS_BLOCK_MAX] = {0}; + + BUILD_BUG_ON(ETP_CALIBRATE_MAX_LEN > sizeof(buf)); error = i2c_smbus_read_block_data(client, - ETP_SMBUS_CALIBRATE_QUERY, val); + ETP_SMBUS_CALIBRATE_QUERY, buf); if (error < 0) return error; + memcpy(val, buf, ETP_CALIBRATE_MAX_LEN); return 0; } @@ -472,6 +476,8 @@ static int elan_smbus_get_report(struct { int len; + BUILD_BUG_ON(I2C_SMBUS_BLOCK_MAX > ETP_SMBUS_REPORT_LEN); + len = i2c_smbus_read_block_data(client, ETP_SMBUS_PACKET_QUERY, &report[ETP_SMBUS_REPORT_OFFSET]);