summaryrefslogtreecommitdiffstats
path: root/patches/cve/CVE-2018-6927-futex-Prevent-overflow-by-strengthen-input-validatio.patch
diff options
context:
space:
mode:
authorAndreas Wellving <andreas.wellving@enea.com>2019-05-21 11:23:06 +0200
committerAndreas Wellving <andreas.wellving@enea.com>2019-05-21 11:23:06 +0200
commite0ea3ce410ff0b3919db1d4db607cd58d7ba2e00 (patch)
treee1e7c1ca0f04447577ccb8204b016305e937193c /patches/cve/CVE-2018-6927-futex-Prevent-overflow-by-strengthen-input-validatio.patch
parentb0fff885f1ccedfd40a7df3a79830493c6d6cf6b (diff)
downloadenea-kernel-cache-e0ea3ce410ff0b3919db1d4db607cd58d7ba2e00.tar.gz
usbip: CVE-2017-16913
usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input Reference: https://nvd.nist.gov/vuln/detail/CVE-2017-16913 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-4.14.y&id=1621db059603e781f61a9bf33cba639b42faf0bc Change-Id: Iffd8d8d26f4fae6bfcde4c518ab38a4d84346e3f Signed-off-by: Andreas Wellving <andreas.wellving@enea.com>
Diffstat (limited to 'patches/cve/CVE-2018-6927-futex-Prevent-overflow-by-strengthen-input-validatio.patch')
0 files changed, 0 insertions, 0 deletions