diff options
author | Johan Hovold <johan@kernel.org> | 2017-03-13 13:47:52 +0100 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2017-03-30 09:41:24 +0200 |
commit | 2e7486a05b81a182c106486ba0b7b91762390103 (patch) | |
tree | 71166eeb3a31e2edc7716bd6ad89a356d761cef2 /drivers/uwb | |
parent | f01c54fe0a8f7d3104cf2207089e2250fbbdfab7 (diff) | |
download | linux-stable-2e7486a05b81a182c106486ba0b7b91762390103.tar.gz linux-stable-2e7486a05b81a182c106486ba0b7b91762390103.tar.bz2 linux-stable-2e7486a05b81a182c106486ba0b7b91762390103.zip |
uwb: hwa-rc: fix NULL-deref at probe
commit daf229b15907fbfdb6ee183aac8ca428cb57e361 upstream.
Make sure to check the number of endpoints to avoid dereferencing a
NULL-pointer should a malicious device lack endpoints.
Note that the dereference happens in the start callback which is called
during probe.
Fixes: de520b8bd552 ("uwb: add HWA radio controller driver")
Cc: Inaky Perez-Gonzalez <inaky.perez-gonzalez@intel.com>
Cc: David Vrabel <david.vrabel@csr.com>
Signed-off-by: Johan Hovold <johan@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'drivers/uwb')
-rw-r--r-- | drivers/uwb/hwa-rc.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/drivers/uwb/hwa-rc.c b/drivers/uwb/hwa-rc.c index 0aa6c3c29d17..35a1e777b449 100644 --- a/drivers/uwb/hwa-rc.c +++ b/drivers/uwb/hwa-rc.c @@ -823,6 +823,9 @@ static int hwarc_probe(struct usb_interface *iface, struct hwarc *hwarc; struct device *dev = &iface->dev; + if (iface->cur_altsetting->desc.bNumEndpoints < 1) + return -ENODEV; + result = -ENOMEM; uwb_rc = uwb_rc_alloc(); if (uwb_rc == NULL) { |