Description: x86/acpi: Prevent out of bound access caused by broken ACPI tables References: https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=70ac67826602edf8c0ccb413e5ba7eacf597a60c Notes: bwh> This is not a valid issue as ACPI tables are trusted. Bugs: upstream: released (4.13-rc2) [dad5ab0db8deac535d03e3fe3d8f2892173fa6a4] 4.9-upstream-stable: released (4.9.40) [036d59f40ac94964a1bbc8959f78f34efac71fd5] 3.16-upstream-stable: released (3.16.50) [52b12e5aeae7f71567348776d4f7f12b83788d15] 3.2-upstream-stable: released (3.2.95) [96301209473afd3f2f274b91cb7082d161b9be65] sid: released (4.13.4-1) 4.9-stretch-security: released (4.9.47-1) 3.16-jessie-security: released (3.16.51-1) 3.2-wheezy-security: released (3.2.96-1)