]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/blame - releases/2.6.36.2/usb-misc-iowarrior-fix-information-leak-to-userland.patch
Fixes for 5.10
[thirdparty/kernel/stable-queue.git] / releases / 2.6.36.2 / usb-misc-iowarrior-fix-information-leak-to-userland.patch
CommitLineData
eaad4d6c
GKH
1From eca67aaeebd6e5d22b0d991af1dd0424dc703bfb Mon Sep 17 00:00:00 2001
2From: Vasiliy Kulikov <segooon@gmail.com>
3Date: Sat, 6 Nov 2010 17:41:31 +0300
4Subject: usb: misc: iowarrior: fix information leak to userland
5
6From: Vasiliy Kulikov <segooon@gmail.com>
7
8commit eca67aaeebd6e5d22b0d991af1dd0424dc703bfb upstream.
9
10Structure iowarrior_info is copied to userland with padding byted
11between "serial" and "revision" fields uninitialized. It leads to
12leaking of contents of kernel stack memory.
13
14Signed-off-by: Vasiliy Kulikov <segooon@gmail.com>
15Acked-by: Kees Cook <kees.cook@canonical.com>
16Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
17
18---
19 drivers/usb/misc/iowarrior.c | 1 +
20 1 file changed, 1 insertion(+)
21
22--- a/drivers/usb/misc/iowarrior.c
23+++ b/drivers/usb/misc/iowarrior.c
24@@ -553,6 +553,7 @@ static long iowarrior_ioctl(struct file
25 /* needed for power consumption */
26 struct usb_config_descriptor *cfg_descriptor = &dev->udev->actconfig->desc;
27
28+ memset(&info, 0, sizeof(info));
29 /* directly from the descriptor */
30 info.vendor = le16_to_cpu(dev->udev->descriptor.idVendor);
31 info.product = dev->product_id;