On Wed, Sep 07, 2016 at 04:09:36PM -0700, Kees Cook wrote:
> On Thu, Sep 1, 2016 at 11:07 PM, Greg KH wrote:
> > On Fri, Sep 02, 2016 at 01:20:21AM +0100, James wrote:
> >> This patch fixes a NULL pointer dereference caused by a race codition in
> >> the probe
> >> function of the legousbtower dr
On Thu, Sep 1, 2016 at 11:07 PM, Greg KH wrote:
> On Fri, Sep 02, 2016 at 01:20:21AM +0100, James wrote:
>> This patch fixes a NULL pointer dereference caused by a race codition in the
>> probe
>> function of the legousbtower driver. The probe function does not deregister
>> the
>> usb interface
On Fri, Sep 02, 2016 at 01:20:21AM +0100, James wrote:
> This patch fixes a NULL pointer dereference caused by a race codition in the
> probe
> function of the legousbtower driver. The probe function does not deregister
> the
> usb interface after an error receiving the devices firmware ID. The d
On Fri, Sep 02, 2016 at 01:20:21AM +0100, James wrote:
> This patch fixes a NULL pointer dereference caused by a race codition in the
> probe
> function of the legousbtower driver. The probe function does not deregister
> the
> usb interface after an error receiving the devices firmware ID. The d
On 09/01/16 17:20, James wrote:
> This patch fixes a NULL pointer dereference caused by a race codition in the
> probe
> function of the legousbtower driver. The probe function does not deregister
> the
> usb interface after an error receiving the devices firmware ID. The device
> file
> registe
This patch fixes a NULL pointer dereference caused by a race codition in the
probe
function of the legousbtower driver. The probe function does not deregister the
usb interface after an error receiving the devices firmware ID. The device file
registered (/dev/usb/legousbtower%d) may be read/writt