]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
remove usbvision-fix-overflow-of-interfaces-array.patch from 3.14 and 4.4
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Tue, 19 Apr 2016 05:55:02 +0000 (14:55 +0900)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Tue, 19 Apr 2016 05:55:02 +0000 (14:55 +0900)
queue-3.14/series
queue-3.14/usbvision-fix-crash-on-detecting-device-with-invalid-configuration.patch
queue-3.14/usbvision-fix-leak-of-usb_dev-on-failure-paths-in-usbvision_probe.patch
queue-3.14/usbvision-fix-overflow-of-interfaces-array.patch [deleted file]
queue-4.4/series
queue-4.4/usbvision-fix-crash-on-detecting-device-with-invalid-configuration.patch
queue-4.4/usbvision-fix-overflow-of-interfaces-array.patch [deleted file]

index 9f6fb03f8aefacc3ad7448202b09451ebf8d5a52..3a4b04294e868c4256d1245645053a6958fbb1a1 100644 (file)
@@ -31,7 +31,6 @@ perf-cure-event-pending_disable-race.patch
 hid-usbhid-fix-inconsistent-reset-resume-reset-resume-behavior.patch
 revert-bad-backport-of-drm-radeon-hold-reference-to-fences-in-radeon_sa_bo_new.patch
 0001-drm-radeon-hold-reference-to-fences-in-radeon_sa_bo_.patch
-usbvision-fix-overflow-of-interfaces-array.patch
 usbvision-fix-leak-of-usb_dev-on-failure-paths-in-usbvision_probe.patch
 usbvision-fix-crash-on-detecting-device-with-invalid-configuration.patch
 revert-usb-hub-do-not-clear-bos-field-during-reset-device.patch
index 7f37b5e41bc021c949b32838cf6e50f2a5aa318b..e78f93ec4472de25e779c84b7f16421e0892bcf5 100644 (file)
@@ -22,7 +22,7 @@ Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
 
 --- a/drivers/media/usb/usbvision/usbvision-video.c
 +++ b/drivers/media/usb/usbvision/usbvision-video.c
-@@ -1546,9 +1546,23 @@ static int usbvision_probe(struct usb_in
+@@ -1539,9 +1539,23 @@ static int usbvision_probe(struct usb_in
  
        if (usbvision_device_data[model].interface >= 0)
                interface = &dev->actconfig->interface[usbvision_device_data[model].interface]->altsetting[0];
index 32ebdf407a0a6e46ba0ebf5cc323051d1f750aac..ac312119d95dfb24bf7b7537e7d4240e5e62b158 100644 (file)
@@ -41,7 +41,7 @@ Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
        }
        printk(KERN_INFO "%s: %s found\n", __func__,
                                usbvision_device_data[model].model_string);
-@@ -1553,18 +1554,21 @@ static int usbvision_probe(struct usb_in
+@@ -1546,18 +1547,21 @@ static int usbvision_probe(struct usb_in
                    __func__, ifnum);
                dev_err(&intf->dev, "%s: Endpoint attributes %d",
                    __func__, endpoint->bmAttributes);
@@ -66,7 +66,7 @@ Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
        }
  
        if (dev->descriptor.bNumConfigurations > 1)
-@@ -1583,8 +1587,8 @@ static int usbvision_probe(struct usb_in
+@@ -1576,8 +1580,8 @@ static int usbvision_probe(struct usb_in
        usbvision->alt_max_pkt_size = kmalloc(32 * usbvision->num_alt, GFP_KERNEL);
        if (usbvision->alt_max_pkt_size == NULL) {
                dev_err(&intf->dev, "usbvision: out of memory!\n");
@@ -77,7 +77,7 @@ Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
        }
  
        for (i = 0; i < usbvision->num_alt; i++) {
-@@ -1619,6 +1623,12 @@ static int usbvision_probe(struct usb_in
+@@ -1612,6 +1616,12 @@ static int usbvision_probe(struct usb_in
  
        PDEBUG(DBG_PROBE, "success");
        return 0;
diff --git a/queue-3.14/usbvision-fix-overflow-of-interfaces-array.patch b/queue-3.14/usbvision-fix-overflow-of-interfaces-array.patch
deleted file mode 100644 (file)
index 36c1fc2..0000000
+++ /dev/null
@@ -1,39 +0,0 @@
-From 588afcc1c0e45358159090d95bf7b246fb67565f Mon Sep 17 00:00:00 2001
-From: Oliver Neukum <oneukum@suse.com>
-Date: Tue, 27 Oct 2015 09:51:34 -0200
-Subject: [media] usbvision fix overflow of interfaces array
-
-From: Oliver Neukum <oneukum@suse.com>
-
-commit 588afcc1c0e45358159090d95bf7b246fb67565f upstream.
-
-This fixes the crash reported in:
-http://seclists.org/bugtraq/2015/Oct/35
-The interface number needs a sanity check.
-
-Signed-off-by: Oliver Neukum <oneukum@suse.com>
-Cc: Vladis Dronov <vdronov@redhat.com>
-Signed-off-by: Hans Verkuil <hans.verkuil@cisco.com>
-Signed-off-by: Mauro Carvalho Chehab <mchehab@osg.samsung.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-
----
- drivers/media/usb/usbvision/usbvision-video.c |    7 +++++++
- 1 file changed, 7 insertions(+)
-
---- a/drivers/media/usb/usbvision/usbvision-video.c
-+++ b/drivers/media/usb/usbvision/usbvision-video.c
-@@ -1536,6 +1536,13 @@ static int usbvision_probe(struct usb_in
-       printk(KERN_INFO "%s: %s found\n", __func__,
-                               usbvision_device_data[model].model_string);
-+      /*
-+       * this is a security check.
-+       * an exploit using an incorrect bInterfaceNumber is known
-+       */
-+      if (ifnum >= USB_MAXINTERFACES || !dev->actconfig->interface[ifnum])
-+              return -ENODEV;
-+
-       if (usbvision_device_data[model].interface >= 0)
-               interface = &dev->actconfig->interface[usbvision_device_data[model].interface]->altsetting[0];
-       else
index aa8dd4a6650cc55d48926b1e470fca6a7027b8ef..ae2a644e1a9d8daae6e945ba7331de6d4d0e66c6 100644 (file)
@@ -132,6 +132,5 @@ revert-x86-pci-don-t-alloc-pcibios-irq-when-msi-is-enabled.patch
 revert-pci-add-helpers-to-manage-pci_dev-irq-and-pci_dev-irq_managed.patch
 revert-pci-x86-implement-pcibios_alloc_irq-and-pcibios_free_irq.patch
 staging-android-ion-set-the-length-of-the-dma-sg-entries-in-buffer.patch
-usbvision-fix-overflow-of-interfaces-array.patch
 usbvision-fix-crash-on-detecting-device-with-invalid-configuration.patch
 revert-usb-hub-do-not-clear-bos-field-during-reset-device.patch
index bb143cdf9fe9924b6c9426b8e58eff741660790d..bf7a3fb530903e21ac44586e7b2fedf51a978ebd 100644 (file)
@@ -22,7 +22,7 @@ Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
 
 --- a/drivers/media/usb/usbvision/usbvision-video.c
 +++ b/drivers/media/usb/usbvision/usbvision-video.c
-@@ -1470,9 +1470,23 @@ static int usbvision_probe(struct usb_in
+@@ -1463,9 +1463,23 @@ static int usbvision_probe(struct usb_in
  
        if (usbvision_device_data[model].interface >= 0)
                interface = &dev->actconfig->interface[usbvision_device_data[model].interface]->altsetting[0];
diff --git a/queue-4.4/usbvision-fix-overflow-of-interfaces-array.patch b/queue-4.4/usbvision-fix-overflow-of-interfaces-array.patch
deleted file mode 100644 (file)
index 7935320..0000000
+++ /dev/null
@@ -1,39 +0,0 @@
-From 588afcc1c0e45358159090d95bf7b246fb67565f Mon Sep 17 00:00:00 2001
-From: Oliver Neukum <oneukum@suse.com>
-Date: Tue, 27 Oct 2015 09:51:34 -0200
-Subject: [media] usbvision fix overflow of interfaces array
-
-From: Oliver Neukum <oneukum@suse.com>
-
-commit 588afcc1c0e45358159090d95bf7b246fb67565f upstream.
-
-This fixes the crash reported in:
-http://seclists.org/bugtraq/2015/Oct/35
-The interface number needs a sanity check.
-
-Signed-off-by: Oliver Neukum <oneukum@suse.com>
-Cc: Vladis Dronov <vdronov@redhat.com>
-Signed-off-by: Hans Verkuil <hans.verkuil@cisco.com>
-Signed-off-by: Mauro Carvalho Chehab <mchehab@osg.samsung.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-
----
- drivers/media/usb/usbvision/usbvision-video.c |    7 +++++++
- 1 file changed, 7 insertions(+)
-
---- a/drivers/media/usb/usbvision/usbvision-video.c
-+++ b/drivers/media/usb/usbvision/usbvision-video.c
-@@ -1461,6 +1461,13 @@ static int usbvision_probe(struct usb_in
-       printk(KERN_INFO "%s: %s found\n", __func__,
-                               usbvision_device_data[model].model_string);
-+      /*
-+       * this is a security check.
-+       * an exploit using an incorrect bInterfaceNumber is known
-+       */
-+      if (ifnum >= USB_MAXINTERFACES || !dev->actconfig->interface[ifnum])
-+              return -ENODEV;
-+
-       if (usbvision_device_data[model].interface >= 0)
-               interface = &dev->actconfig->interface[usbvision_device_data[model].interface]->altsetting[0];
-       else