Bluetooth: hidp: fix buffer overflow
authorYoung Xiao <YangX92@hotmail.com>
Fri, 12 Apr 2019 07:24:30 +0000 (15:24 +0800)
committerSalvatore Bonaccorso <carnil@debian.org>
Thu, 18 Jul 2019 22:23:17 +0000 (23:23 +0100)
commit5c054eb6995316c98641a60e7872258bee638dc2
tree8de412339c59ab75b7ec3abda29e61c34cc2bca2
parent217e7702b1152408c8a88d351ab00c2facb61bf8
Bluetooth: hidp: fix buffer overflow

Struct ca is copied from userspace. It is not checked whether the "name"
field is NULL terminated, which allows local users to obtain potentially
sensitive information from kernel stack memory, via a HIDPCONNADD command.

This vulnerability is similar to CVE-2011-1079.

Signed-off-by: Young Xiao <YangX92@hotmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
Cc: stable@vger.kernel.org
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name Bluetooth-hidp-fix-buffer-overflow.patch
net/bluetooth/hidp/sock.c