summaryrefslogtreecommitdiff
path: root/net
diff options
context:
space:
mode:
authorAndrea Parri (Microsoft) <parri.andrea@gmail.com>2021-04-20 04:43:50 +0300
committerWei Liu <wei.liu@kernel.org>2021-04-20 22:40:17 +0300
commit8c2d5e0640e53c14b6240e9bf1e32a2226e6e6ca (patch)
treef8e4d1c4f267e9a092d17105f848fe93831ca393 /net
parentb635ccc1ec26b9b6e2cb1495c3d9d903e0b4f95a (diff)
downloadlinux-8c2d5e0640e53c14b6240e9bf1e32a2226e6e6ca.tar.xz
Drivers: hv: vmbus: Initialize unload_event statically
If a malicious or compromised Hyper-V sends a spurious message of type CHANNELMSG_UNLOAD_RESPONSE, the function vmbus_unload_response() will call complete() on an uninitialized event, and cause an oops. Reported-by: Michael Kelley <mikelley@microsoft.com> Signed-off-by: Andrea Parri (Microsoft) <parri.andrea@gmail.com> Reviewed-by: Michael Kelley <mikelley@microsoft.com> Link: https://lore.kernel.org/r/20210420014350.2002-1-parri.andrea@gmail.com Signed-off-by: Wei Liu <wei.liu@kernel.org>
Diffstat (limited to 'net')
0 files changed, 0 insertions, 0 deletions