Bluetooth: hidp: fix buffer overflow
authorYoung Xiao <YangX92@hotmail.com>
Fri, 12 Apr 2019 07:24:30 +0000 (15:24 +0800)
committerBen Hutchings <ben@decadent.org.uk>
Wed, 19 Jun 2019 22:16:58 +0000 (23:16 +0100)
commit38234935618ed8293096a5a51b1db71e342a30d4
treef9b5df94a9287ca6bb0430ec1000cdca24af5ff8
parentd90cfe9e8fa0503f447057e94d05030bf1b64c57
Bluetooth: hidp: fix buffer overflow

Struct ca is copied from userspace. It is not checked whether the "name"
field is NULL terminated, which allows local users to obtain potentially
sensitive information from kernel stack memory, via a HIDPCONNADD command.

This vulnerability is similar to CVE-2011-1079.

Signed-off-by: Young Xiao <YangX92@hotmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
Cc: stable@vger.kernel.org
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name Bluetooth-hidp-fix-buffer-overflow.patch
net/bluetooth/hidp/sock.c