mirror of
https://github.com/raspberrypi/linux.git
synced 2025-12-06 10:00:17 +00:00
USB: iowarrior: fix NULL-deref in write
commitde46e56653upstream. Make sure to verify that we have the required interrupt-out endpoint for IOWarrior56 devices to avoid dereferencing a NULL-pointer in write should a malicious device lack such an endpoint. Fixes:946b960d13("USB: add driver for iowarrior devices.") Signed-off-by: Johan Hovold <johan@kernel.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
This commit is contained in:
committed by
Greg Kroah-Hartman
parent
653418adaf
commit
f06b17020a
@@ -798,6 +798,14 @@ static int iowarrior_probe(struct usb_interface *interface,
|
|||||||
goto error;
|
goto error;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (dev->product_id == USB_DEVICE_ID_CODEMERCS_IOW56) {
|
||||||
|
if (!dev->int_out_endpoint) {
|
||||||
|
dev_err(&interface->dev, "no interrupt-out endpoint found\n");
|
||||||
|
retval = -ENODEV;
|
||||||
|
goto error;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/* we have to check the report_size often, so remember it in the endianness suitable for our machine */
|
/* we have to check the report_size often, so remember it in the endianness suitable for our machine */
|
||||||
dev->report_size = usb_endpoint_maxp(dev->int_in_endpoint);
|
dev->report_size = usb_endpoint_maxp(dev->int_in_endpoint);
|
||||||
if ((dev->interface->cur_altsetting->desc.bInterfaceNumber == 0) &&
|
if ((dev->interface->cur_altsetting->desc.bInterfaceNumber == 0) &&
|
||||||
|
|||||||
Reference in New Issue
Block a user