Potential Vulnerability in Cloned Code
This PR fixes a potential security vulnerability in htc_config_pipe_credits, htc_setup_complete, and htc_connect_service that were cloned from https://github.com/torvalds/linux/commit/853acf7caf10b828102d92d05b5c101666a6142b but did not receive the security patch.
Details:
In htc_config_pipe_credits, htc_setup_complete, and htc_connect_service if time out happens, the allocated buffer needs to be released. Otherwise there will be memory leak.
Original Fix: https://github.com/torvalds/linux/commit/853acf7caf10b828102d92d05b5c101666a6142b
What this PR does:
This PR applies the same security patch that was applied to the original repository to eliminate the potential vulnerability in the cloned code.
References:
- https://github.com/torvalds/linux/commit/853acf7caf10b828102d92d05b5c101666a6142b
- https://nvd.nist.gov/vuln/detail/cve-2019-19073
Please review and merge this PR to ensure your repository is protected against this potential vulnerability.