[char-misc-next 0/8] mei security fixes and cleanups

From: Tomas Winkler
Date: Mon Oct 21 2013 - 15:16:57 EST


This series add fixes for possible security holes
mostly pointed out by static analysis tools and probably
not all of them are real with exception the nfc memory leak.

Alexander Usyskin (2):
mei: replace stray pr_debug with dev_dbg
mei: print correct device state during unexpected reset

Tomas Winkler (6):
mei: debugfs: validate dev is not null
mei: hbm: validate client index is not exceeding allocated array size
mei: nfc: fix memory leak in error path
mei: wd: host_init propagate error codes from called functions
mei: bus: propagate error code returned by mei_me_cl_by_id
mei: mei_cl_link remove duplicated check for open_handle_count

drivers/misc/mei/bus.c | 2 +-
drivers/misc/mei/client.c | 6 ------
drivers/misc/mei/debugfs.c | 12 ++++++++++--
drivers/misc/mei/hbm.c | 6 ++++--
drivers/misc/mei/init.c | 8 ++++----
drivers/misc/mei/nfc.c | 10 ++++++----
drivers/misc/mei/pci-me.c | 2 +-
drivers/misc/mei/wd.c | 12 ++++++------
8 files changed, 32 insertions(+), 26 deletions(-)

--
1.8.3.1

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/