<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/drivers/usb/misc, branch v2.6.32.60</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/drivers/usb/misc?h=v2.6.32.60</id>
<link rel='self' href='https://git.amat.us/linux/atom/drivers/usb/misc?h=v2.6.32.60'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2012-02-03T17:26:57Z</updated>
<entry>
<title>USB: usbsevseg: fix max length</title>
<updated>2012-02-03T17:26:57Z</updated>
<author>
<name>Harrison Metzger</name>
<email>harrisonmetz@gmail.com</email>
</author>
<published>2012-01-15T14:43:24Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=2b93e1fde1b44ed8941e946515ecf10eb15a5a96'/>
<id>urn:sha1:2b93e1fde1b44ed8941e946515ecf10eb15a5a96</id>
<content type='text'>
commit 1097ccebe630170080c41df0edcf88e0626e9c75 upstream.

This changes the max length for the usb seven segment delcom device to 8
from 6. Delcom has both 6 and 8 variants and having 8 works fine with
devices which are only 6.

Signed-off-by: Harrison Metzger &lt;harrisonmetz@gmail.com&gt;
Signed-off-by: Stuart Pook &lt;stuart@acm.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>USB: isight: fix kernel bug when loading firmware</title>
<updated>2012-01-12T19:40:05Z</updated>
<author>
<name>Greg Kroah-Hartman</name>
<email>gregkh@suse.de</email>
</author>
<published>2011-12-05T22:02:59Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e8afc51e8169043a511040fd06b71f4598a1bf41'/>
<id>urn:sha1:e8afc51e8169043a511040fd06b71f4598a1bf41</id>
<content type='text'>
commit 59bf5cf94f0fa3b08fb1258b52649077b7d0914d upstream.

We were sending data on the stack when uploading firmware, which causes
some machines fits, and is not allowed.  Fix this by using the buffer we
already had around for this very purpose.

Reported-by: Wouter M. Koolen &lt;wmkoolen@cwi.nl&gt;
Tested-by: Wouter M. Koolen &lt;wmkoolen@cwi.nl&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>USB: uss720 fixup refcount position</title>
<updated>2011-03-27T18:30:46Z</updated>
<author>
<name>Peter Holik</name>
<email>peter@holik.at</email>
</author>
<published>2011-03-18T17:47:44Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=658e9624a3302c6885df35ea7177df18049c7657'/>
<id>urn:sha1:658e9624a3302c6885df35ea7177df18049c7657</id>
<content type='text'>
commit adaa3c6342b249548ea830fe8e02aa5b45be8688 upstream.

My testprog do a lot of bitbang - after hours i got following warning and my machine lockups:
WARNING: at /build/buildd/linux-2.6.38/lib/kref.c:34
After debugging uss720 driver i discovered that the completion callback was called before
usb_submit_urb returns. The callback frees the request structure that is krefed on return by
usb_submit_urb.

Signed-off-by: Peter Holik &lt;peter@holik.at&gt;
Acked-by: Thomas Sailer &lt;t.sailer@alumni.ethz.ch&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>usb: iowarrior: don't trust report_size for buffer size</title>
<updated>2011-03-07T23:17:58Z</updated>
<author>
<name>Kees Cook</name>
<email>kees.cook@canonical.com</email>
</author>
<published>2010-10-11T18:28:16Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=304a854922606ce1b87cae1a972c567232a4013c'/>
<id>urn:sha1:304a854922606ce1b87cae1a972c567232a4013c</id>
<content type='text'>
commit 3ed780117dbe5acb64280d218f0347f238dafed0 upstream.

If the iowarrior devices in this case statement support more than 8 bytes
per report, it is possible to write past the end of a kernel heap allocation.
This will probably never be possible, but change the allocation to be more
defensive anyway.

Signed-off-by: Kees Cook &lt;kees.cook@canonical.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
Acked-by: Brandon Philips &lt;bphilips@suse.de&gt;


</content>
</entry>
<entry>
<title>USB: misc: uss720.c: add another vendor/product ID</title>
<updated>2011-01-07T22:43:15Z</updated>
<author>
<name>Thomas Sailer</name>
<email>t.sailer@alumni.ethz.ch</email>
</author>
<published>2010-12-14T15:04:05Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=14084f5b87b5eacc93a318876bc1d81202b9188f'/>
<id>urn:sha1:14084f5b87b5eacc93a318876bc1d81202b9188f</id>
<content type='text'>
commit ecc1624a2fff45780959efbcb73ace18fdb3c58d upstream.

Fabio Battaglia report that he has another cable that works with this
driver, so this patch adds its vendor/product ID.

Signed-off-by: Thomas Sailer &lt;t.sailer@alumni.ethz.ch&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>USB: misc: usbsevseg: fix up some sysfs attribute permissions</title>
<updated>2010-12-09T21:26:59Z</updated>
<author>
<name>Greg Kroah-Hartman</name>
<email>gregkh@suse.de</email>
</author>
<published>2010-11-15T19:36:44Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e4aa2cab57c2a2cd76d82f72b3eea8c1418d2183'/>
<id>urn:sha1:e4aa2cab57c2a2cd76d82f72b3eea8c1418d2183</id>
<content type='text'>
commit e24d7ace4e822debcb78386bf279c9aba4d7fbd1 upstream.

They should not be writable by any user.

Reported-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Cc: Harrison Metzger &lt;harrisonmetz@gmail.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>USB: misc: trancevibrator: fix up a sysfs attribute permission</title>
<updated>2010-12-09T21:26:58Z</updated>
<author>
<name>Greg Kroah-Hartman</name>
<email>gregkh@suse.de</email>
</author>
<published>2010-11-15T19:34:26Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=872d84628480ee1e26503e45e9650c09c649380c'/>
<id>urn:sha1:872d84628480ee1e26503e45e9650c09c649380c</id>
<content type='text'>
commit d489a4b3926bad571d404ca6508f6744b9602776 upstream.

It should not be writable by any user.

Reported-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Cc: Sam Hocevar &lt;sam@zoy.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>USB: misc: usbled: fix up some sysfs attribute permissions</title>
<updated>2010-12-09T21:26:57Z</updated>
<author>
<name>Greg Kroah-Hartman</name>
<email>gregkh@suse.de</email>
</author>
<published>2010-11-15T19:35:49Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=0658f4b5ff80df551c5411f2a9a448f62664d2dc'/>
<id>urn:sha1:0658f4b5ff80df551c5411f2a9a448f62664d2dc</id>
<content type='text'>
commit 48f115470e68d443436b76b22dad63ffbffd6b97 upstream.

They should not be writable by any user.

Reported-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>USB: misc: cypress_cy7c63: fix up some sysfs attribute permissions</title>
<updated>2010-12-09T21:26:57Z</updated>
<author>
<name>Greg Kroah-Hartman</name>
<email>gregkh@suse.de</email>
</author>
<published>2010-11-15T19:32:38Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=d9d7d5f7290a7882b4b388b739af284bdb986b17'/>
<id>urn:sha1:d9d7d5f7290a7882b4b388b739af284bdb986b17</id>
<content type='text'>
commit c990600d340641150f7270470a64bd99a5c0b225 upstream.

They should not be writable by any user.

Reported-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Cc: Oliver Bock &lt;bock@tfh-berlin.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>usb: misc: iowarrior: fix information leak to userland</title>
<updated>2010-12-09T21:26:55Z</updated>
<author>
<name>Vasiliy Kulikov</name>
<email>segooon@gmail.com</email>
</author>
<published>2010-11-06T14:41:31Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=25281c78b18e69379f6e2a00c693417208e8b8a7'/>
<id>urn:sha1:25281c78b18e69379f6e2a00c693417208e8b8a7</id>
<content type='text'>
commit eca67aaeebd6e5d22b0d991af1dd0424dc703bfb upstream.

Structure iowarrior_info is copied to userland with padding byted
between "serial" and "revision" fields uninitialized.  It leads to
leaking of contents of kernel stack memory.

Signed-off-by: Vasiliy Kulikov &lt;segooon@gmail.com&gt;
Acked-by: Kees Cook &lt;kees.cook@canonical.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
</feed>
