Skip to content

Commit a1616a5

Browse files
Yoha-testholtmann
authored andcommitted
Bluetooth: hidp: fix buffer overflow
Struct ca is copied from userspace. It is not checked whether the "name" field is NULL terminated, which allows local users to obtain potentially sensitive information from kernel stack memory, via a HIDPCONNADD command. This vulnerability is similar to CVE-2011-1079. Signed-off-by: Young Xiao <YangX92@hotmail.com> Signed-off-by: Marcel Holtmann <marcel@holtmann.org> Cc: stable@vger.kernel.org
1 parent 7362334 commit a1616a5

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

net/bluetooth/hidp/sock.c

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,7 @@ static int do_hidp_sock_ioctl(struct socket *sock, unsigned int cmd, void __user
7575
sockfd_put(csock);
7676
return err;
7777
}
78+
ca.name[sizeof(ca.name)-1] = 0;
7879

7980
err = hidp_connection_add(&ca, csock, isock);
8081
if (!err && copy_to_user(argp, &ca, sizeof(ca)))

0 commit comments

Comments
 (0)