ath9k_htc: fix NULL-deref at probe
authorJohan Hovold <johan@kernel.org>
Mon, 13 Mar 2017 12:44:20 +0000 (13:44 +0100)
committerSasha Levin <alexander.levin@verizon.com>
Wed, 17 May 2017 19:08:20 +0000 (15:08 -0400)
[ Upstream commit ebeb36670ecac36c179b5fb5d5c88ff03ba191ec ]

Make sure to check the number of endpoints to avoid dereferencing a
NULL-pointer or accessing memory beyond the endpoint array should a
malicious device lack the expected endpoints.

Fixes: 36bcce430657 ("ath9k_htc: Handle storage devices")
Cc: stable <stable@vger.kernel.org> # 2.6.39+
Signed-off-by: Johan Hovold <johan@kernel.org>
Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>
Signed-off-by: Sasha Levin <alexander.levin@verizon.com>
drivers/net/wireless/ath/ath9k/hif_usb.c

index 58cb92cca3cab07f4e66e4b24899c0d92c11a585..83a98b9aaea57efe2ad4f38973010635b1fa5ece 100644 (file)
@@ -1145,6 +1145,9 @@ static int send_eject_command(struct usb_interface *interface)
        u8 bulk_out_ep;
        int r;
 
+       if (iface_desc->desc.bNumEndpoints < 2)
+               return -ENODEV;
+
        /* Find bulk out endpoint */
        for (r = 1; r >= 0; r--) {
                endpoint = &iface_desc->endpoint[r].desc;