Re: [RFC 0/6] xHCI and USB security bug fixes

2013-06-03 Thread Sarah Sharp
On Thu, May 30, 2013 at 07:04:03AM +0900, Greg Kroah-Hartman wrote: On Wed, May 29, 2013 at 10:45:04AM -0700, Sarah Sharp wrote: On Wed, May 29, 2013 at 10:27:50AM +0900, Greg Kroah-Hartman wrote: On Fri, May 24, 2013 at 05:42:52PM -0700, Sarah Sharp wrote: This patchset address some

Re: [RFC 0/6] xHCI and USB security bug fixes

2013-06-03 Thread Greg Kroah-Hartman
On Mon, Jun 03, 2013 at 12:10:19PM -0700, Sarah Sharp wrote: On Thu, May 30, 2013 at 07:04:03AM +0900, Greg Kroah-Hartman wrote: On Wed, May 29, 2013 at 10:45:04AM -0700, Sarah Sharp wrote: On Wed, May 29, 2013 at 10:27:50AM +0900, Greg Kroah-Hartman wrote: On Fri, May 24, 2013 at

Re: [RFC 0/6] xHCI and USB security bug fixes

2013-05-30 Thread Greg Kroah-Hartman
On Wed, May 29, 2013 at 10:45:04AM -0700, Sarah Sharp wrote: On Wed, May 29, 2013 at 10:27:50AM +0900, Greg Kroah-Hartman wrote: On Fri, May 24, 2013 at 05:42:52PM -0700, Sarah Sharp wrote: This patchset address some (but not all) of the security issues found with the Klockwork static

Re: [RFC 0/6] xHCI and USB security bug fixes

2013-05-29 Thread Sarah Sharp
On Wed, May 29, 2013 at 10:27:50AM +0900, Greg Kroah-Hartman wrote: On Fri, May 24, 2013 at 05:42:52PM -0700, Sarah Sharp wrote: This patchset address some (but not all) of the security issues found with the Klockwork static analysis tool. I have not reviewed these in detail to see if

Re: [RFC 0/6] xHCI and USB security bug fixes

2013-05-28 Thread Greg Kroah-Hartman
On Fri, May 24, 2013 at 05:42:52PM -0700, Sarah Sharp wrote: This patchset address some (but not all) of the security issues found with the Klockwork static analysis tool. I have not reviewed these in detail to see if these could be used by attackers, so someone with more security experience

[RFC 0/6] xHCI and USB security bug fixes

2013-05-24 Thread Sarah Sharp
This patchset address some (but not all) of the security issues found with the Klockwork static analysis tool. I have not reviewed these in detail to see if these could be used by attackers, so someone with more security experience may want to look these over. Sarah Sharp The following changes