Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4023248ybl; Mon, 3 Feb 2020 11:03:22 -0800 (PST) X-Google-Smtp-Source: APXvYqzLGZrevp34+eC9e+Cchj69YlL9Gqz7WCnRYnAmdC5hXnIyYpeFbJ8BSwwWGpA28QCXXpui X-Received: by 2002:a9d:7999:: with SMTP id h25mr18714786otm.347.1580756602250; Mon, 03 Feb 2020 11:03:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580756602; cv=none; d=google.com; s=arc-20160816; b=AHJIMcTfOs5IGh3EwrH5RNVZoV0pSu8wDZ4H/VNEYrqZBTUpBbrPH9LHnB0MqTSgSB mILhdHEZaqh8wnugjB+hqVoh4anp8QpWwouAoCdDHLTUaeYAFDlD194SkkpEzknLfgRD nyWg+AG7s9qjXdaiy88snXN6L1QucYm4JPmL5ijbqYO8YvYaCq5wCpbGAvTlpuvLPD55 yR4Z9TZSmWHe+w4jzZkOJVrlRjHqKdn7XNxRiNYc+83VWstLVW3UHj7xVTQhuoycgr7X j7x5CROKfEjo5/gh4/leBjkVTe7axUWYxawgetMiQlUDXy66L6LII+B9i6zaEaFKopVN 5S3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=5OsSB0gu5eXhRC8GAkfjQEhkwqrADRieI7Lh3YM/m98=; b=zdmd5SF4c1eon/fiyEKxApiuHUBYblSIVAJlYFb91CWl16gIx1KY6wUzAeMhqRdQEg 5BknC8icYiHkD9sb1s5HArcxrVaNu/cc+J5icOKBogB2eva334aUbWvdxE+qFZkRvftk 7hIvkcglEeUSTG4+paN1flpI9qVBdDpQVLXmgsrdMs3qEu/Ay6KHEQPCO5Zm7I20inlV mH/2xC7xsyFLgX1YzR2CUsFOEU0VhzsaPHj8/5lwru/iLrd0cjHGZ7cKXANKfMubdOK1 smfcQ1IU0Ncn4fPjLoItubNNbYa8FHu9vPYwmDzEWfeXsSlmvrl1dGD/YgWPqoC+ljH7 8u+A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ncLtot7D; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g5si9663250otn.232.2020.02.03.11.03.09; Mon, 03 Feb 2020 11:03:22 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ncLtot7D; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729270AbgBCQ0o (ORCPT + 99 others); Mon, 3 Feb 2020 11:26:44 -0500 Received: from mail.kernel.org ([198.145.29.99]:37716 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729245AbgBCQ0l (ORCPT ); Mon, 3 Feb 2020 11:26:41 -0500 Received: from localhost (unknown [104.132.45.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 65A8C2051A; Mon, 3 Feb 2020 16:26:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580747200; bh=SYaKm53L2/I72Tnwsrj7k4qz91HsmQhZdl1JkzVKpWc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ncLtot7DL9GWslSWDLZpAAm6BOES20dEYoDTyk3jzbKz/DJpBtHVDeRkkeTiawdHT NESGYBQmhSWzi+LGmHFnsWBOYchv9YyBqeW0OlIQPMyiluiTjp1S/C/E/kJaY4miN4 3zA0q1LL36KhURigWgoNKw23FlePzgZ42FcDFFE8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold , Kalle Valo Subject: [PATCH 4.9 02/68] orinoco_usb: fix interface sanity check Date: Mon, 3 Feb 2020 16:18:58 +0000 Message-Id: <20200203161905.061964573@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200203161904.705434837@linuxfoundation.org> References: <20200203161904.705434837@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit b73e05aa543cf8db4f4927e36952360d71291d41 upstream. Make sure to use the current alternate setting when verifying the interface descriptors to avoid binding to an invalid interface. Failing to do so could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: 9afac70a7305 ("orinoco: add orinoco_usb driver") Cc: stable # 2.6.35 Signed-off-by: Johan Hovold Signed-off-by: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/intersil/orinoco/orinoco_usb.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/net/wireless/intersil/orinoco/orinoco_usb.c +++ b/drivers/net/wireless/intersil/orinoco/orinoco_usb.c @@ -1601,9 +1601,9 @@ static int ezusb_probe(struct usb_interf /* set up the endpoint information */ /* check out the endpoints */ - iface_desc = &interface->altsetting[0].desc; + iface_desc = &interface->cur_altsetting->desc; for (i = 0; i < iface_desc->bNumEndpoints; ++i) { - ep = &interface->altsetting[0].endpoint[i].desc; + ep = &interface->cur_altsetting->endpoint[i].desc; if (usb_endpoint_is_bulk_in(ep)) { /* we found a bulk in endpoint */