]> git.kernelconcepts.de Git - karo-tx-linux.git/commitdiff
Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace.
authorFilip Palian <s3810@pjwstk.edu.pl>
Thu, 12 May 2011 17:32:46 +0000 (19:32 +0200)
committerGreg Kroah-Hartman <gregkh@suse.de>
Mon, 7 Nov 2011 21:47:38 +0000 (13:47 -0800)
commit 8d03e971cf403305217b8e62db3a2e5ad2d6263f upstream.

Structures "l2cap_conninfo" and "rfcomm_conninfo" have one padding
byte each. This byte in "cinfo" is copied to userspace uninitialized.

Signed-off-by: Filip Palian <filip.palian@pjwstk.edu.pl>
Acked-by: Marcel Holtmann <marcel@holtmann.org>
Signed-off-by: Gustavo F. Padovan <padovan@profusion.mobi>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
net/bluetooth/l2cap.c
net/bluetooth/rfcomm/sock.c

index 615fecc5b3d440a261729ecaf32e3bfe8ea2021b..e6859fea515b7270e0939c98beefc4c9a01eb9b1 100644 (file)
@@ -1892,6 +1892,7 @@ static int l2cap_sock_getsockopt_old(struct socket *sock, int optname, char __us
                        break;
                }
 
+               memset(&cinfo, 0, sizeof(cinfo));
                cinfo.hci_handle = l2cap_pi(sk)->conn->hcon->handle;
                memcpy(cinfo.dev_class, l2cap_pi(sk)->conn->hcon->dev_class, 3);
 
index bc03b508f35ecf75be23aab0144709832c29564b..46c3f60cb3d6fc0b80747dc7810549d64b43fc85 100644 (file)
@@ -879,6 +879,7 @@ static int rfcomm_sock_getsockopt_old(struct socket *sock, int optname, char __u
 
                l2cap_sk = rfcomm_pi(sk)->dlc->session->sock->sk;
 
+               memset(&cinfo, 0, sizeof(cinfo));
                cinfo.hci_handle = l2cap_pi(l2cap_sk)->conn->hcon->handle;
                memcpy(cinfo.dev_class, l2cap_pi(l2cap_sk)->conn->hcon->dev_class, 3);