Bluetooth: hidp: fix information leak to userland
authorVasiliy Kulikov <segooon@gmail.com>
Sat, 30 Oct 2010 14:26:31 +0000 (18:26 +0400)
committerGustavo F. Padovan <padovan@profusion.mobi>
Wed, 1 Dec 2010 23:04:36 +0000 (21:04 -0200)
commitd31dbf6e5989b2fd9a30ec5b25436e94f009d6df
tree5a7ad10f10b50e5b4c2f514d86b94311d17c4450
parent3185fbd9d7bb166992f072440b3329f58bf2c60a
Bluetooth: hidp: fix information leak to userland

Structure hidp_conninfo is copied to userland with version, product,
vendor and name fields unitialized if both session->input and session->hid
are NULL.  It leads to leaking of contents of kernel stack memory.

Signed-off-by: Vasiliy Kulikov <segooon@gmail.com>
Acked-by: Marcel Holtmann <marcel@holtmann.org>
Signed-off-by: Gustavo F. Padovan <padovan@profusion.mobi>
net/bluetooth/hidp/core.c