summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAlan Stern <stern@rowland.harvard.edu>2019-04-23 14:48:29 -0400
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2019-05-16 09:17:17 +0200
commit15c0d2672a4711fa277ca040e92af36009de4bf6 (patch)
tree38e4baab7da5237054d744c654b2cdc437323241
parentf4d6bb3a95bee415639f1abd27e5ac1c649dbde9 (diff)
downloadlinux-stable-15c0d2672a4711fa277ca040e92af36009de4bf6.tar.gz
linux-stable-15c0d2672a4711fa277ca040e92af36009de4bf6.tar.bz2
linux-stable-15c0d2672a4711fa277ca040e92af36009de4bf6.zip
USB: yurex: Fix protection fault after device removal
commit ef61eb43ada6c1d6b94668f0f514e4c268093ff3 upstream. The syzkaller USB fuzzer found a general-protection-fault bug in the yurex driver. The fault occurs when a device has been unplugged; the driver's interrupt-URB handler logs an error message referring to the device by name, after the device has been unregistered and its name deallocated. This problem is caused by the fact that the interrupt URB isn't cancelled until the driver's private data structure is released, which can happen long after the device is gone. The cure is to make sure that the interrupt URB is killed before yurex_disconnect() returns; this is exactly the sort of thing that usb_poison_urb() was meant for. Signed-off-by: Alan Stern <stern@rowland.harvard.edu> Reported-and-tested-by: syzbot+2eb9121678bdb36e6d57@syzkaller.appspotmail.com CC: <stable@vger.kernel.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--drivers/usb/misc/yurex.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/drivers/usb/misc/yurex.c b/drivers/usb/misc/yurex.c
index fbcb1cd4c118..b92046a38644 100644
--- a/drivers/usb/misc/yurex.c
+++ b/drivers/usb/misc/yurex.c
@@ -332,6 +332,7 @@ static void yurex_disconnect(struct usb_interface *interface)
usb_deregister_dev(interface, &yurex_class);
/* prevent more I/O from starting */
+ usb_poison_urb(dev->urb);
mutex_lock(&dev->io_mutex);
dev->interface = NULL;
mutex_unlock(&dev->io_mutex);