Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp3960004img; Mon, 25 Mar 2019 23:33:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqzkqOzB1N9SQGVPpPWRde7+NUQrrTJS+Hx3sm090mgvuQPDdfIhtZX2BKdiPGeBfUqtJ06C X-Received: by 2002:a63:c54a:: with SMTP id g10mr5501578pgd.71.1553582004409; Mon, 25 Mar 2019 23:33:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553582004; cv=none; d=google.com; s=arc-20160816; b=GeqKJ18qcDJIXdswZZn0tN/qhT3VuhPBq0STcY6V5nyJUBsIwvva/7uqSX6s8r511g hmAxt9d0azR6rBw9+XzB91dQE0yOZ/NL10B99SMalvvun1XNZgFUJfRKt23w5oQvbhxN 9Ot4nEp9JFcitW1DOn491UP9NOlNwU5fUhiTHkLmG4viwQC7POT3H24WZkimqbl5qs8V iEGM5hM8UQzmVbBiloNK55FOgAgsi3H4wjCUEm3HvuX705SJ39V7vpaT2lyfo24YXUfB ZXt69ShyyYVfgkkkkxRz8Cg61gv2hQV8ZruLOfcqVT7005xyJnAO9Ufv/ZWiamZu6fAZ 2z3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=xB/Fi/HDIMefHef8Yvl7W4LW69DUU/mAEJEnrQMwyJY=; b=j9wC5lVRGbHnrGNU2CdFY1D10djQlf7zcTfuzdqKEKOc8mr0kQioIXyU7TjW0xlWvm DR6qYqJzGRjAQRvMrQPicvI0icAA0rUZDxuEQwIhwELrUkAbm/ZM3PHyDTvd8Y+VCYWe IxrWvePfzoqSoOpFWsI3sUjo0nHziz7tEPvcJesPCXO4iZXxsvoQjhP2ZzYTNyUAkWb3 XmhurneCaKMTQouHwRw3aScS6eG2dquvlXxVrOvIp7M+gufHksZOSgyZH0oe2sBssqSR 6dXDZn46Yga+C4YSjKOLlwVqQMUV3O+EWGwQ5A+NLXY+r2HY0v5k+9aXj6f3qHpE50k1 Kncg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ji5xdtaD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 189si15520707pgb.412.2019.03.25.23.33.09; Mon, 25 Mar 2019 23:33:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ji5xdtaD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731323AbfCZGcE (ORCPT + 99 others); Tue, 26 Mar 2019 02:32:04 -0400 Received: from mail.kernel.org ([198.145.29.99]:41456 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731303AbfCZGcC (ORCPT ); Tue, 26 Mar 2019 02:32:02 -0400 Received: from localhost (unknown [104.132.152.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4754220856; Tue, 26 Mar 2019 06:32:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553581922; bh=12IooVjyAEfCTMMZbwj0jQjOcNrx8uCB2OtNLspzVN4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ji5xdtaDO1uGdo0VaCd94Rjqjef9OrjS/LXmO2VaVrGxavTkPSG02VLUMMwx1Xl2Z Rl0qncDo/1AjsLZ2PixbWwWTQAN0XstpPfiF7FoJP4TLteTqISdtI+Esof0KRZtyvp uQ62rK5oOyjPbNYN/Hp2gPaqP1WS8jG8iSIyTZgI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andrey Konovalov , Arnd Bergmann Subject: [PATCH 4.9 25/30] USB: core: only clean up what we allocated Date: Tue, 26 Mar 2019 15:30:04 +0900 Message-Id: <20190326042608.413616958@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190326042607.558087893@linuxfoundation.org> References: <20190326042607.558087893@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Andrey Konovalov commit 32fd87b3bbf5f7a045546401dfe2894dbbf4d8c3 upstream. When cleaning up the configurations, make sure we only free the number of configurations and interfaces that we could have allocated. Reported-by: Andrey Konovalov Cc: stable Signed-off-by: Arnd Bergmann Signed-off-by: Greg Kroah-Hartman --- drivers/usb/core/config.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) --- a/drivers/usb/core/config.c +++ b/drivers/usb/core/config.c @@ -763,18 +763,21 @@ void usb_destroy_configuration(struct us return; if (dev->rawdescriptors) { - for (i = 0; i < dev->descriptor.bNumConfigurations; i++) + for (i = 0; i < dev->descriptor.bNumConfigurations && + i < USB_MAXCONFIG; i++) kfree(dev->rawdescriptors[i]); kfree(dev->rawdescriptors); dev->rawdescriptors = NULL; } - for (c = 0; c < dev->descriptor.bNumConfigurations; c++) { + for (c = 0; c < dev->descriptor.bNumConfigurations && + c < USB_MAXCONFIG; c++) { struct usb_host_config *cf = &dev->config[c]; kfree(cf->string); - for (i = 0; i < cf->desc.bNumInterfaces; i++) { + for (i = 0; i < cf->desc.bNumInterfaces && + i < USB_MAXINTERFACES; i++) { if (cf->intf_cache[i]) kref_put(&cf->intf_cache[i]->ref, usb_release_interface_cache);