]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
NFC: nci: Add bounds checking in nci_hci_create_pipe()
authorDan Carpenter <dan.carpenter@linaro.org>
Fri, 17 Jan 2025 09:38:41 +0000 (12:38 +0300)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 13 Mar 2025 11:47:12 +0000 (12:47 +0100)
commit 110b43ef05342d5a11284cc8b21582b698b4ef1c upstream.

The "pipe" variable is a u8 which comes from the network.  If it's more
than 127, then it results in memory corruption in the caller,
nci_hci_connect_gate().

Cc: stable@vger.kernel.org
Fixes: a1b0b9415817 ("NFC: nci: Create pipe on specific gate in nci_hci_connect_gate")
Signed-off-by: Dan Carpenter <dan.carpenter@linaro.org>
Reviewed-by: Simon Horman <horms@kernel.org>
Reviewed-by: Krzysztof Kozlowski <krzysztof.kozlowski@linaro.org>
Link: https://patch.msgid.link/bcf5453b-7204-4297-9c20-4d8c7dacf586@stanley.mountain
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
net/nfc/nci/hci.c

index 4fe336ff2bfa1a3cade853acd10acea89adbbe14..f8140488b08adc4d23e081ff72d49958c8350820 100644 (file)
@@ -548,6 +548,8 @@ static u8 nci_hci_create_pipe(struct nci_dev *ndev, u8 dest_host,
 
        pr_debug("pipe created=%d\n", pipe);
 
+       if (pipe >= NCI_HCI_MAX_PIPES)
+               pipe = NCI_HCI_INVALID_PIPE;
        return pipe;
 }