Bluetooth: hidp: fix buffer overflow
authorYoung Xiao <YangX92@hotmail.com>
Fri, 12 Apr 2019 07:24:30 +0000 (15:24 +0800)
committerGrazvydas Ignotas <notasas@gmail.com>
Sat, 20 Jul 2019 23:59:12 +0000 (02:59 +0300)
commitc6a2a06e4461b01c63911369c470a011e5145e66
tree6b0454ffcdf36725aa829d4370afb043a71dcfd9
parent4cecd7e369e1b252db1d64451462221b362eed1c
Bluetooth: hidp: fix buffer overflow

commit a1616a5ac99ede5d605047a9012481ce7ff18b16 upstream.

Struct ca is copied from userspace. It is not checked whether the "name"
field is NULL terminated, which allows local users to obtain potentially
sensitive information from kernel stack memory, via a HIDPCONNADD command.

This vulnerability is similar to CVE-2011-1079.

Signed-off-by: Young Xiao <YangX92@hotmail.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
net/bluetooth/hidp/sock.c