Files
linux/drivers
Seungjin Bae c4e746651b Input: pegasus-notetaker - fix potential out-of-bounds access
[ Upstream commit 69aeb50731 ]

In the pegasus_notetaker driver, the pegasus_probe() function allocates
the URB transfer buffer using the wMaxPacketSize value from
the endpoint descriptor. An attacker can use a malicious USB descriptor
to force the allocation of a very small buffer.

Subsequently, if the device sends an interrupt packet with a specific
pattern (e.g., where the first byte is 0x80 or 0x42),
the pegasus_parse_packet() function parses the packet without checking
the allocated buffer size. This leads to an out-of-bounds memory access.

Fixes: 1afca2b66a ("Input: add Pegasus Notetaker tablet driver")
Signed-off-by: Seungjin Bae <eeodqql09@gmail.com>
Link: https://lore.kernel.org/r/20251007214131.3737115-2-eeodqql09@gmail.com
Cc: stable@vger.kernel.org
Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2025-12-03 12:45:22 +01:00
..
2022-05-09 09:03:20 +02:00
2024-02-23 08:24:54 +01:00
2020-12-30 11:51:26 +01:00
2025-12-03 12:45:20 +01:00
2025-12-03 12:45:19 +01:00
2022-08-25 11:18:33 +02:00
2023-07-27 08:37:19 +02:00