UPSTREAM: USB: gadget: validate interface OS descriptor requests
Stall the control endpoint in case provided index exceeds array size of MAX_CONFIG_INTERFACES or when the retrieved function pointer is null. Bug: 213172319 Signed-off-by:Szymon Heidrich <szymon.heidrich@gmail.com> Cc: stable@kernel.org Signed-off-by:
Greg Kroah-Hartman <gregkh@linuxfoundation.org> (cherry picked from commit 75e5b4849b81e19e9efe1654b30d7f3151c33c2c) Signed-off-by:
Greg Kroah-Hartman <gregkh@google.com> Change-Id: I78f46b6f2140394a6bc6cff9f829c0742d7ad2fc (cherry picked from commit c7732dbce590ef33ac2345f21efa6703f78b9e95) Git-commit: 823fc2b264f1ec12678564271c5fa34e3250cf83 Git-repo: https://android.googlesource.com/kernel/common Signed-off-by:
PavanKumar S.R <quic_pavasr@quicinc.com>
Loading
Please register or sign in to comment