]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
NFC: nci: Add bounds checking in nci_hci_create_pipe()
authorDan Carpenter <dan.carpenter@linaro.org>
Fri, 17 Jan 2025 09:38:41 +0000 (12:38 +0300)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 21 Feb 2025 12:49:51 +0000 (13:49 +0100)
commit 110b43ef05342d5a11284cc8b21582b698b4ef1c upstream.

The "pipe" variable is a u8 which comes from the network.  If it's more
than 127, then it results in memory corruption in the caller,
nci_hci_connect_gate().

Cc: stable@vger.kernel.org
Fixes: a1b0b9415817 ("NFC: nci: Create pipe on specific gate in nci_hci_connect_gate")
Signed-off-by: Dan Carpenter <dan.carpenter@linaro.org>
Reviewed-by: Simon Horman <horms@kernel.org>
Reviewed-by: Krzysztof Kozlowski <krzysztof.kozlowski@linaro.org>
Link: https://patch.msgid.link/bcf5453b-7204-4297-9c20-4d8c7dacf586@stanley.mountain
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
net/nfc/nci/hci.c

index 78c4b6addf15aa79add61b4bd9e920c3a7e1e7de..1057d5347e55672a9c57352636bde40a3352a86e 100644 (file)
@@ -540,6 +540,8 @@ static u8 nci_hci_create_pipe(struct nci_dev *ndev, u8 dest_host,
 
        pr_debug("pipe created=%d\n", pipe);
 
+       if (pipe >= NCI_HCI_MAX_PIPES)
+               pipe = NCI_HCI_INVALID_PIPE;
        return pipe;
 }