Revision 46c319b848268dab3f0e7c4a5b6e9146d3bca8a4 authored by Johan Hovold on 13 March 2017, 12:49:45 UTC, committed by Wim Van Sebroeck on 18 May 2017, 16:51:34 UTC
Make sure to check the number of endpoints to avoid dereferencing a NULL-pointer should a malicious device lack endpoints. Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") Cc: stable <stable@vger.kernel.org> Signed-off-by: Johan Hovold <johan@kernel.org> Reviewed-by: Guenter Roeck <linux@roeck-us.net> Signed-off-by: Guenter Roeck <linux@roeck-us.net> Signed-off-by: Wim Van Sebroeck <wim@iguana.be>
1 parent ddd6d24
File | Mode | Size |
---|---|---|
apparmor | ||
integrity | ||
keys | ||
loadpin | ||
selinux | ||
smack | ||
tomoyo | ||
yama | ||
Kconfig | -rw-r--r-- | 8.3 KB |
Makefile | -rw-r--r-- | 989 bytes |
commoncap.c | -rw-r--r-- | 31.5 KB |
device_cgroup.c | -rw-r--r-- | 21.0 KB |
inode.c | -rw-r--r-- | 6.8 KB |
lsm_audit.c | -rw-r--r-- | 10.2 KB |
min_addr.c | -rw-r--r-- | 1.3 KB |
security.c | -rw-r--r-- | 41.1 KB |
Computing file changes ...