In the Linux kernel, the following vulnerability has been resolved: usb: gadget: aspeed_udc: validate endpoint index for ast udc We should verify the bound of the array to assure that host may not manipulate the index to point past endpoint array. Found by static analysis.
https://git.kernel.org/stable/c/ee0d382feb44ec0f445e2ad63786cd7f3f6a8199
https://git.kernel.org/stable/c/b2a50ffdd1a079869a62198a8d1441355c513c7c
https://git.kernel.org/stable/c/6fe9ca2ca389114c8da66e534c18273497843e8a
https://git.kernel.org/stable/c/31bd4fab49c0adc6228848357c1b1df9395858af