lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 21 Oct 2013 22:05:35 +0300
From:	Tomas Winkler <tomas.winkler@...el.com>
To:	gregkh@...uxfoundation.org
Cc:	arnd@...db.de, linux-kernel@...r.kernel.org,
	Tomas Winkler <tomas.winkler@...el.com>
Subject: [char-misc-next 0/8] mei security fixes and cleanups

This series add fixes for possible security holes
mostly pointed out by static analysis tools and probably
not all of them are real with exception the nfc memory leak.

Alexander Usyskin (2):
  mei: replace stray pr_debug with dev_dbg
  mei: print correct device state during unexpected reset

Tomas Winkler (6):
  mei: debugfs: validate dev is not null
  mei: hbm: validate client index is not exceeding allocated array size
  mei: nfc: fix memory leak in error path
  mei: wd: host_init propagate error codes from called functions
  mei: bus: propagate error code returned by mei_me_cl_by_id
  mei: mei_cl_link remove duplicated check for open_handle_count

 drivers/misc/mei/bus.c     |  2 +-
 drivers/misc/mei/client.c  |  6 ------
 drivers/misc/mei/debugfs.c | 12 ++++++++++--
 drivers/misc/mei/hbm.c     |  6 ++++--
 drivers/misc/mei/init.c    |  8 ++++----
 drivers/misc/mei/nfc.c     | 10 ++++++----
 drivers/misc/mei/pci-me.c  |  2 +-
 drivers/misc/mei/wd.c      | 12 ++++++------
 8 files changed, 32 insertions(+), 26 deletions(-)

-- 
1.8.3.1

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ