diff options
author | Dan Carpenter <dan.carpenter@oracle.com> | 2018-01-10 12:39:03 +0300 |
---|---|---|
committer | Jiri Kosina <jkosina@suse.cz> | 2018-01-23 17:46:58 +0300 |
commit | 7ad81482cad67cbe1ec808490d1ddfc420c42008 (patch) | |
tree | 0224b26501aa50635630d3300382025ae63e1e97 /net/bluetooth | |
parent | 7cb4774e2d3282d29edd00762167876a27cc7d2a (diff) | |
download | linux-7ad81482cad67cbe1ec808490d1ddfc420c42008.tar.xz |
HID: roccat: prevent an out of bounds read in kovaplus_profile_activated()
We get the "new_profile_index" value from the mouse device when we're
handling raw events. Smatch taints it as untrusted data and complains
that we need a bounds check. This seems like a reasonable warning
otherwise there is a small read beyond the end of the array.
Fixes: 0e70f97f257e ("HID: roccat: Add support for Kova[+] mouse")
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Acked-by: Silvan Jegen <s.jegen@gmail.com>
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
Diffstat (limited to 'net/bluetooth')
0 files changed, 0 insertions, 0 deletions