commit | 084b6e7765b9554699afa23a50e702a3d0ae4b24 | [log] [tgz] |
---|---|---|
author | Salva Peiró <speiro@ai2.upv.es> | Mon Mar 03 08:44:04 2014 +0100 |
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | Tue Mar 04 16:20:01 2014 -0800 |
tree | 50efbe4843bc48fd5220b6f02ff1add272431a7e | |
parent | 0414855fdc4a40da05221fc6062cccbc0c30f169 [diff] |
staging/cxt1e1/linux.c: Correct arbitrary memory write in c4_ioctl() The function c4_ioctl() writes data from user in ifr->ifr_data to the kernel struct data arg, without any iolen bounds checking. This can lead to a arbitrary write outside of the struct data arg. Corrected by adding bounds-checking of iolen before the copy_from_user(). Signed-off-by: Salva Peiró <speiro@ai2.upv.es> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>