lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Sat, 10 Aug 2019 13:51:55 +0200
From:   Greg KH <gregkh@...uxfoundation.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     Andrew Morton <akpm@...ux-foundation.org>,
        linux-kernel@...r.kernel.org, linux-usb@...r.kernel.org
Subject: [GIT PULL] USB fixes for 5.3-rc4

The following changes since commit 609488bc979f99f805f34e9a32c1e3b71179d10b:

  Linux 5.3-rc2 (2019-07-28 12:47:02 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git tags/usb-5.3-rc4

for you to fetch changes up to 27709ae4e2fe6cf7da2ae45e718e190c5433342b:

  usb: setup authorized_default attributes using usb_bus_notify (2019-08-08 16:07:34 +0200)

----------------------------------------------------------------
USB fixes for 5.3-rc4

Here are some small USB fixes for 5.3-rc4.

The "biggest" one here is moving code from one file to another in order
to fix a long-standing race condition with the creation of sysfs files
for USB devices.  Turns out that there are now userspace tools out there
that are hitting this long-known bug, so it's time to fix them.
Thankfully the tool-maker in this case fixed the issue :)

The other patches in here are all fixes for reported issues.  Now that
syzbot knows how to fuzz USB drivers better, and is starting to now fuzz
the userspace facing side of them at the same time, there will be more
and more small fixes like these coming, which is a good thing.

All of these have been in linux-next with no reported issues.

Signed-off-by: Greg Kroah-Hartman <gregkh@...uxfoundation.org>

----------------------------------------------------------------
Gavin Li (1):
      usb: usbfs: fix double-free of usb memory upon submiturb error

Guenter Roeck (2):
      usb: typec: tcpm: Add NULL check before dereferencing config
      usb: typec: tcpm: Ignore unsupported/unknown alternate mode requests

Heikki Krogerus (1):
      usb: typec: ucsi: ccg: Fix uninitilized symbol error

Li Jun (2):
      usb: typec: tcpm: free log buf memory when remove debug file
      usb: typec: tcpm: remove tcpm dir if no children

Mathias Nyman (1):
      xhci: Fix NULL pointer dereference at endpoint zero reset.

Oliver Neukum (2):
      Revert "USB: rio500: simplify locking"
      usb: iowarrior: fix deadlock on disconnect

Suzuki K Poulose (1):
      usb: yurex: Fix use-after-free in yurex_delete

ThiƩbaud Weksteen (1):
      usb: setup authorized_default attributes using usb_bus_notify

Yoshihiro Shimoda (1):
      usb: host: xhci-rcar: Fix timeout in xhci_suspend()

 drivers/usb/core/devio.c          |   2 -
 drivers/usb/core/hcd.c            | 123 --------------------------------------
 drivers/usb/core/sysfs.c          | 121 +++++++++++++++++++++++++++++++++++++
 drivers/usb/core/usb.h            |   5 ++
 drivers/usb/host/xhci-rcar.c      |   9 ++-
 drivers/usb/host/xhci.c           |  10 ++++
 drivers/usb/misc/iowarrior.c      |   7 ++-
 drivers/usb/misc/rio500.c         |  43 ++++++++-----
 drivers/usb/misc/yurex.c          |   2 +-
 drivers/usb/typec/tcpm/tcpm.c     |  58 ++++++++++++------
 drivers/usb/typec/ucsi/ucsi_ccg.c |   2 +-
 11 files changed, 217 insertions(+), 165 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ