From 149a3120a71d2ec54114ab99803dee0720db024e Mon Sep 17 00:00:00 2001 From: Oliver Neukum Date: Jan 26 2022 11:07:30 +0000 Subject: Update patches.suse/USB-gadget-detect-too-big-endpoint-0-requests.patch (bsc#1193802 CVE-2021-39685). Updated references for CVE that became known after the fix had been applied for other reasons --- diff --git a/patches.suse/USB-gadget-detect-too-big-endpoint-0-requests.patch b/patches.suse/USB-gadget-detect-too-big-endpoint-0-requests.patch index ab30839..c0a6f0a 100644 --- a/patches.suse/USB-gadget-detect-too-big-endpoint-0-requests.patch +++ b/patches.suse/USB-gadget-detect-too-big-endpoint-0-requests.patch @@ -4,7 +4,7 @@ Date: Thu, 9 Dec 2021 18:59:27 +0100 Subject: [PATCH] USB: gadget: detect too-big endpoint 0 requests Git-commit: 153a2d7e3350cc89d406ba2d35be8793a64c2038 Patch-mainline: v5.16-rc5 -References: git-fixes +References: bsc#1193802 CVE-2021-39685 Sometimes USB hosts can ask for buffers that are too large from endpoint 0, which should not be allowed. If this happens for OUT requests, stall