From: Johan Hovold Date: Mon, 13 Mar 2017 12:47:50 +0000 (+0100) Subject: USB: uss720: fix NULL-deref at probe X-Git-Tag: v4.9.19~50 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=e4942716bb78231e29944bc89dc8a0ee42d07748;p=platform%2Fkernel%2Flinux-amlogic.git USB: uss720: fix NULL-deref at probe commit f259ca3eed6e4b79ac3d5c5c9fb259fb46e86217 upstream. Make sure to check the number of endpoints to avoid dereferencing a NULL-pointer or accessing memory beyond the endpoint array should a malicious device lack the expected endpoints. Note that the endpoint access that causes the NULL-deref is currently only used for debugging purposes during probe so the oops only happens when dynamic debugging is enabled. This means the driver could be rewritten to continue to accept device with only two endpoints, should such devices exist. Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") Signed-off-by: Johan Hovold Signed-off-by: Greg Kroah-Hartman --- diff --git a/drivers/usb/misc/uss720.c b/drivers/usb/misc/uss720.c index 356d312..9ff6652 100644 --- a/drivers/usb/misc/uss720.c +++ b/drivers/usb/misc/uss720.c @@ -708,6 +708,11 @@ static int uss720_probe(struct usb_interface *intf, interface = intf->cur_altsetting; + if (interface->desc.bNumEndpoints < 3) { + usb_put_dev(usbdev); + return -ENODEV; + } + /* * Allocate parport interface */