commit | eca67aaeebd6e5d22b0d991af1dd0424dc703bfb | [log] [tgz] |
---|---|---|
author | Vasiliy Kulikov <segooon@gmail.com> | Sat Nov 06 17:41:31 2010 +0300 |
committer | Greg Kroah-Hartman <gregkh@suse.de> | Thu Nov 11 07:14:07 2010 -0800 |
tree | d2feaad27048cf110f868f5e0d5a1884c9bd14d7 | |
parent | 5dc92cf1d0b4b0debbd2e333b83f9746c103533d [diff] |
usb: misc: iowarrior: fix information leak to userland Structure iowarrior_info is copied to userland with padding byted between "serial" and "revision" fields uninitialized. It leads to leaking of contents of kernel stack memory. Signed-off-by: Vasiliy Kulikov <segooon@gmail.com> Cc: stable <stable@kernel.org> Acked-by: Kees Cook <kees.cook@canonical.com> Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>