Revision 46c319b848268dab3f0e7c4a5b6e9146d3bca8a4 authored by Johan Hovold on 13 March 2017, 12:49:45 UTC, committed by Wim Van Sebroeck on 18 May 2017, 16:51:34 UTC
Make sure to check the number of endpoints to avoid dereferencing a
NULL-pointer should a malicious device lack endpoints.

Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
Cc: stable <stable@vger.kernel.org>
Signed-off-by: Johan Hovold <johan@kernel.org>
Reviewed-by: Guenter Roeck <linux@roeck-us.net>
Signed-off-by: Guenter Roeck <linux@roeck-us.net>
Signed-off-by: Wim Van Sebroeck <wim@iguana.be>
1 parent ddd6d24
History
File Mode Size
apparmor
integrity
keys
loadpin
selinux
smack
tomoyo
yama
Kconfig -rw-r--r-- 8.3 KB
Makefile -rw-r--r-- 989 bytes
commoncap.c -rw-r--r-- 31.5 KB
device_cgroup.c -rw-r--r-- 21.0 KB
inode.c -rw-r--r-- 6.8 KB
lsm_audit.c -rw-r--r-- 10.2 KB
min_addr.c -rw-r--r-- 1.3 KB
security.c -rw-r--r-- 41.1 KB

back to top