This is a note to let you know that I've just added the patch titled Input: kbtab - validate number of endpoints before using them to the 4.9-stable tree which can be found at: http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary The filename of the patch is: input-kbtab-validate-number-of-endpoints-before-using-them.patch and it can be found in the queue-4.9 subdirectory. If you, or anyone else, feels it should not be added to the stable tree, please let <stable@xxxxxxxxxxxxxxx> know about it. >From cb1b494663e037253337623bf1ef2df727883cb7 Mon Sep 17 00:00:00 2001 From: Johan Hovold <johan@xxxxxxxxxx> Date: Thu, 16 Mar 2017 11:41:55 -0700 Subject: Input: kbtab - validate number of endpoints before using them From: Johan Hovold <johan@xxxxxxxxxx> commit cb1b494663e037253337623bf1ef2df727883cb7 upstream. Make sure to check the number of endpoints to avoid dereferencing a NULL-pointer should a malicious device lack endpoints. Signed-off-by: Johan Hovold <johan@xxxxxxxxxx> Signed-off-by: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx> Signed-off-by: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx> --- drivers/input/tablet/kbtab.c | 3 +++ 1 file changed, 3 insertions(+) --- a/drivers/input/tablet/kbtab.c +++ b/drivers/input/tablet/kbtab.c @@ -122,6 +122,9 @@ static int kbtab_probe(struct usb_interf struct input_dev *input_dev; int error = -ENOMEM; + if (intf->cur_altsetting->desc.bNumEndpoints < 1) + return -ENODEV; + kbtab = kzalloc(sizeof(struct kbtab), GFP_KERNEL); input_dev = input_allocate_device(); if (!kbtab || !input_dev) Patches currently in stable-queue which might be from johan@xxxxxxxxxx are queue-4.9/usb-serial-option-add-quectel-uc15-uc20-ec21-and-ec25-modems.patch queue-4.9/input-ims-pcu-validate-number-of-endpoints-before-using-them.patch queue-4.9/usb-usbtmc-add-missing-endpoint-sanity-check.patch queue-4.9/input-cm109-validate-number-of-endpoints-before-using-them.patch queue-4.9/input-iforce-validate-number-of-endpoints-before-using-them.patch queue-4.9/mmc-ushc-fix-null-deref-at-probe.patch queue-4.9/input-kbtab-validate-number-of-endpoints-before-using-them.patch queue-4.9/usb-usbtmc-fix-probe-error-path.patch queue-4.9/input-sur40-validate-number-of-endpoints-before-using-them.patch queue-4.9/uwb-i1480-dfu-fix-null-deref-at-probe.patch queue-4.9/input-hanwang-validate-number-of-endpoints-before-using-them.patch queue-4.9/usb-idmouse-fix-null-deref-at-probe.patch queue-4.9/uwb-hwa-rc-fix-null-deref-at-probe.patch queue-4.9/usb-lvtest-fix-null-deref-at-probe.patch queue-4.9/input-yealink-validate-number-of-endpoints-before-using-them.patch queue-4.9/usb-serial-qcserial-add-dell-dw5811e.patch queue-4.9/usb-uss720-fix-null-deref-at-probe.patch queue-4.9/usb-wusbcore-fix-null-deref-at-probe.patch