Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2298931ybl; Thu, 19 Dec 2019 11:12:12 -0800 (PST) X-Google-Smtp-Source: APXvYqxpLn3IbTSQBk/LtvAysZdnXHlfnFbsh5oXGkBVAb0FnjK27CaA2XFvYCj7O3uomBRHixlc X-Received: by 2002:a05:6830:2141:: with SMTP id r1mr10333188otd.39.1576782732583; Thu, 19 Dec 2019 11:12:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576782732; cv=none; d=google.com; s=arc-20160816; b=cPEOrzaHbqaDScRbX4hAdORgrrASp9ie5NKVs92nyoJjoiX2TtaV+kJCOibXLsmdyf mgUPnlzqZldMVDXOid9ibA2birr3NYNN5bvzqwcFzjLkh0iuBT7XIhVcHjj140m+4mR1 VyjM9J2r8rZJZ7VWWIdw9jCR2JjC60gy9DrMRBc0UK/8Jp6MYPqLIuie3tbBrB7v5oCZ zKchVqO+xYqeg/mZ/iHrhaTuZ4gRCNNax6n5ZRtz4Hz44D1C6GKXG3i4ErZ7HpzxOhMD vWTQYn3CLVsfoLyGtYWBk5q7nX+SZJ8CNPtgtuXH/+bwG/WD4A1XKx342ARtfAxFoAYf RhWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=3tebF7ApZTORr+BnfMhxwRhKZV4hIatM6aPb7L3Yejs=; b=BZjTHSxqerIh1hyhXQgTHhCd8vmLK5Wg4S7+aqppdrEmPdchZloTLc9BZTnZhX8USW mhBFKfbeOkcQzo47guTn27y0b4alQChQJ5Ii0+37ifR718YbozytqqDhOqQDiN/46ROp 83+Wcf83H3RVKamn/y1XQMIu3POlxAGLf0DyNA9504TlD8BlTU4t+TruG+fnH53bYnxZ 6UGyZFkVjGDyrTweRai7rO47xgKOQLLBsiF9NjhfaRmo1gZtvTxAnST1G6V/E823pbeY TwKjnZZu4Ny0Z8wYN4Cc8Qy8w7cdGRSKZPQV0+HXKLBRZlE26ONHK/oc7QIgTeUbhTnc ITgw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RryhaLlV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e22si2599288oiy.124.2019.12.19.11.12.00; Thu, 19 Dec 2019 11:12:12 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RryhaLlV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728097AbfLSSiu (ORCPT + 99 others); Thu, 19 Dec 2019 13:38:50 -0500 Received: from mail.kernel.org ([198.145.29.99]:56794 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728089AbfLSSir (ORCPT ); Thu, 19 Dec 2019 13:38:47 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9E27D222C2; Thu, 19 Dec 2019 18:38:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1576780727; bh=Sgkhd3pJREA3CUXciHyFhjWfspP5e00Oladewn/tE70=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RryhaLlVa2fwULlzAK/nU4SJZd6lGHc3J2qaAwcrxcJx6qaC2LM8Dl7M+w3cxx3Va zFxCiAgObx0oYmGKCUeATPKJOzvjYQt8wHhwth3yQjdKNB/zYOqFrAzJwOmjAsYXzg k90AqUrpBN2JIZ7FEgOxAQBCqfIoTG8fjY+FZaGk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold Subject: [PATCH 4.4 092/162] USB: idmouse: fix interface sanity checks Date: Thu, 19 Dec 2019 19:33:20 +0100 Message-Id: <20191219183213.393889923@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191219183150.477687052@linuxfoundation.org> References: <20191219183150.477687052@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 59920635b89d74b9207ea803d5e91498d39e8b69 upstream. Make sure to use the current alternate setting when verifying the interface descriptors to avoid binding to an invalid interface. Failing to do so could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") Cc: stable Signed-off-by: Johan Hovold Link: https://lore.kernel.org/r/20191210112601.3561-4-johan@kernel.org Signed-off-by: Greg Kroah-Hartman --- drivers/usb/misc/idmouse.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/usb/misc/idmouse.c +++ b/drivers/usb/misc/idmouse.c @@ -342,7 +342,7 @@ static int idmouse_probe(struct usb_inte int result; /* check if we have gotten the data or the hid interface */ - iface_desc = &interface->altsetting[0]; + iface_desc = interface->cur_altsetting; if (iface_desc->desc.bInterfaceClass != 0x0A) return -ENODEV;