Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp3961569img; Mon, 25 Mar 2019 23:35:50 -0700 (PDT) X-Google-Smtp-Source: APXvYqxHs7goB8CbWFDnKjWO2Yo3NeOktG3Bs/bRtj0+2kmIZLKyoe8vzmJ18u0Kzf+qNdFyqSB2 X-Received: by 2002:a17:902:1121:: with SMTP id d30mr29698268pla.104.1553582150598; Mon, 25 Mar 2019 23:35:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553582150; cv=none; d=google.com; s=arc-20160816; b=jve8fB0A5S628hxJWpO+sjCFg7jB+nHecHstPOU14vGq+2yOHfq5ApoES/CFwF4QLZ GybaHkazVAi5owPCzB/UoMZudCznSdFL9eQl9H2dGUK18zg43iEIqDodjvD0NTVJ/YHQ ViphLccPQIcZeElsuZvyhyV+Je2gd1RssGJSBwOBFRRX5ofm5hXnuCeG1qU/jIQKtb/Y sIPBATpTXbEMwhU7BfAL+FyUCxNuHuMdXGYTeS9SBiaDqXn163pK+pOk37sa2548G7L8 xLluPdkSSRkJuwF4sIRhUAugu59G/dCYX7ELmlUUCsjnq0lLaIaDECvQ19+JqPtZGj0P zEFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=6cUbqEgFuEZW7pae9yDW/2jjeUS2ZIuviPs6sSHCDV4=; b=sZl9cZjuwGELDx4bmpzj3vTWU02uRrs6/eYaaIk+BRfBdum7KG5Qxe6GnA2ElJXVk7 MmOl+Mx0H92fmQe3HZKpsh+tYk3qOPtsuei1Hazy/uMXSiGxF83gEGoo9CitCBswd6Yk NQrG2lUNPCAJZWdaIzou+0ylLL2teK2hU7AT2D+bitxiEJNHH3DPi5tEkh1qWBpXdRru dE+woiXlDoMJpdWoupeLnX/XUy6P5UMNGRdLYgb+WxFleLDk9m1IoK+2icmwm/368P8E RTeT6/0t8Bn47btUxK848YFm8TAU1Oh8KQ4yD3COvbIHEU65doHX9z3PAzLZ2jCtIjOU s16A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NGVz+Z2v; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b18si13024217pgj.500.2019.03.25.23.35.35; Mon, 25 Mar 2019 23:35:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NGVz+Z2v; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731841AbfCZGeV (ORCPT + 99 others); Tue, 26 Mar 2019 02:34:21 -0400 Received: from mail.kernel.org ([198.145.29.99]:44700 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731441AbfCZGeR (ORCPT ); Tue, 26 Mar 2019 02:34:17 -0400 Received: from localhost (unknown [104.132.152.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B00C9206C0; Tue, 26 Mar 2019 06:34:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553582056; bh=vD24KTYdgdJB3spyUTLMyzy0NJeiqJF0oQ4Yi7k3LRg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=NGVz+Z2vIhxBJ8Y0EUR8fN3A3l3QxYZE6/awsRK61KMjrvVS/+h8bbkHnjHGauPXJ Ts53pefnpHlqPLjqDQyhecWfLYtSu+qIb438umxMfUi79P7fNvvEYlOeGNeBmLZ44B sa/DcPEtxE5SmSvty3xwEh6qUrLczpH2LvxyJevg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andrey Konovalov , Arnd Bergmann Subject: [PATCH 4.14 32/41] USB: core: only clean up what we allocated Date: Tue, 26 Mar 2019 15:30:09 +0900 Message-Id: <20190326042651.655316226@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190326042649.889479098@linuxfoundation.org> References: <20190326042649.889479098@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Andrey Konovalov commit 32fd87b3bbf5f7a045546401dfe2894dbbf4d8c3 upstream. When cleaning up the configurations, make sure we only free the number of configurations and interfaces that we could have allocated. Reported-by: Andrey Konovalov Cc: stable Signed-off-by: Arnd Bergmann Signed-off-by: Greg Kroah-Hartman --- drivers/usb/core/config.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) --- a/drivers/usb/core/config.c +++ b/drivers/usb/core/config.c @@ -768,18 +768,21 @@ void usb_destroy_configuration(struct us return; if (dev->rawdescriptors) { - for (i = 0; i < dev->descriptor.bNumConfigurations; i++) + for (i = 0; i < dev->descriptor.bNumConfigurations && + i < USB_MAXCONFIG; i++) kfree(dev->rawdescriptors[i]); kfree(dev->rawdescriptors); dev->rawdescriptors = NULL; } - for (c = 0; c < dev->descriptor.bNumConfigurations; c++) { + for (c = 0; c < dev->descriptor.bNumConfigurations && + c < USB_MAXCONFIG; c++) { struct usb_host_config *cf = &dev->config[c]; kfree(cf->string); - for (i = 0; i < cf->desc.bNumInterfaces; i++) { + for (i = 0; i < cf->desc.bNumInterfaces && + i < USB_MAXINTERFACES; i++) { if (cf->intf_cache[i]) kref_put(&cf->intf_cache[i]->ref, usb_release_interface_cache);