From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752457AbdCMPQV (ORCPT ); Mon, 13 Mar 2017 11:16:21 -0400 Received: from mx2.suse.de ([195.135.220.15]:45708 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751245AbdCMPQM (ORCPT ); Mon, 13 Mar 2017 11:16:12 -0400 Message-ID: <1489418118.30110.26.camel@suse.com> Subject: Re: [PATCH 0/7] Input: fix NULL-derefs at probe From: Oliver Neukum To: Johan Hovold , Dmitry Torokhov Cc: linux-input@vger.kernel.org, linux-kernel@vger.kernel.org, linux-usb@vger.kernel.org Date: Mon, 13 Mar 2017 16:15:18 +0100 In-Reply-To: <20170313123539.28103-1-johan@kernel.org> References: <20170313123539.28103-1-johan@kernel.org> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Am Montag, den 13.03.2017, 13:35 +0100 schrieb Johan Hovold: > This series fixes a number of NULL-pointer dereferences due to > missing > endpoint sanity checks that can be triggered by a malicious USB > device. >  At the risk of repeating myself, doesn't the sheer number of fixes demonstrate the need for a more centralized check? Regards Oliver