Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4640625ybl; Wed, 22 Jan 2020 01:51:00 -0800 (PST) X-Google-Smtp-Source: APXvYqwT/nD1CsmhlrMExQxpw+s6BrZ4+Pq7SUImn/KMyyIe0eahNs+cvM3Igmccfeyi1xkhURam X-Received: by 2002:a05:6808:3d0:: with SMTP id o16mr6267842oie.79.1579686660182; Wed, 22 Jan 2020 01:51:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579686660; cv=none; d=google.com; s=arc-20160816; b=vVnmexDlwkhD+XOdYPBT1G6IJUUaNxiQVji2y+1WpR2FNNHwl/ykxLazWChfkeM7We FcOMQF/duc7eZx7Q4Fze7J6r6JwyecEcPvhnQXN8/aeozVmRscMa3HFEC4lrd+q4kK+r 9IZeWhOX7llQKScflBQi4XtaPz/CbMhUusWZqiAp1leDUCbz4QU8X9C7zFXPvVzAfxdu hBNbZSJCSzgNX3ksGFcXtTQIQW5VokoS8GX/DkchVMcPUi+3dOX2kCgWXm+cr/QwAJwX f1f4AwIjQEuWx1jl0njQtqWkMBAGD286ze+DwYaOgrXbvuAYqRTa6zkEablEveeog4Cw +QnQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=s/i+MzQ/pbH4fogxIAq/BN61Ifw9T9O1f/164qkE8mY=; b=GuTvtTJ9u3W+8IHT3O9atPw/AfOUTDsbSR+8uN7bk7JW6wr/QbXt+jZlRrRwiClRRW JoPKJ2f2ICE1sxO74gzgFsoluAUzNJLC5yJ+i1SUTr4alMtpdileh+Amw86zPxH26Rsc a/bV7+kfhUfZxClb/+bRcLbEZMdZNSqPPkjnQdwUNjKBg7hnJG6WA3T/n+SZVAUgq27Z Z0g7ExHRL1PonqqK/S1o5Bb6X+hekaZoKKoT88G0z0hnUB3SstS9ffxe5qLB5sIev+x9 luWABrEtyIBMW6+4BzDIJbQ8hSrKQLQOhlfedvIQ5LZdG6+3HEIjnnQCP5QJoSdOYyrN xO3g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dCsaZ9uW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z11si23827745otm.312.2020.01.22.01.50.48; Wed, 22 Jan 2020 01:51:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dCsaZ9uW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729732AbgAVJt7 (ORCPT + 99 others); Wed, 22 Jan 2020 04:49:59 -0500 Received: from mail.kernel.org ([198.145.29.99]:56628 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732375AbgAVJjL (ORCPT ); Wed, 22 Jan 2020 04:39:11 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 874C924683; Wed, 22 Jan 2020 09:39:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579685951; bh=P+15TQf4p8PgRDquc4qBLe74dlyOXsfLeByMgiv4dSM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dCsaZ9uWE1m8gdMzDSCdUNRhgR72Esb2uUxHxVqhWGJ5v6FCHa9A0ULZda+XV842U R2ZzmmG0MlFbOp31XmQhvWist8WxC7y3r9FW2B46HHQ8McogeHXLN4rOmRNL9bSLF1 Njnze2TSSBnJNjVy3Yb+b8A46B21/5IQI+W06Fog= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, hayeswang , Johan Hovold , "David S. Miller" Subject: [PATCH 4.14 48/65] r8152: add missing endpoint sanity check Date: Wed, 22 Jan 2020 10:29:33 +0100 Message-Id: <20200122092758.061703243@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200122092750.976732974@linuxfoundation.org> References: <20200122092750.976732974@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold [ Upstream commit 86f3f4cd53707ceeec079b83205c8d3c756eca93 ] Add missing endpoint sanity check to probe in order to prevent a NULL-pointer dereference (or slab out-of-bounds access) when retrieving the interrupt-endpoint bInterval on ndo_open() in case a device lacks the expected endpoints. Fixes: 40a82917b1d3 ("net/usb/r8152: enable interrupt transfer") Cc: hayeswang Signed-off-by: Johan Hovold Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/usb/r8152.c | 3 +++ 1 file changed, 3 insertions(+) --- a/drivers/net/usb/r8152.c +++ b/drivers/net/usb/r8152.c @@ -5158,6 +5158,9 @@ static int rtl8152_probe(struct usb_inte return -ENODEV; } + if (intf->cur_altsetting->desc.bNumEndpoints < 3) + return -ENODEV; + usb_reset_device(udev); netdev = alloc_etherdev(sizeof(struct r8152)); if (!netdev) {