summaryrefslogtreecommitdiff
path: root/drivers/leds/leds-alix2.c
diff options
context:
space:
mode:
authorDan Rosenberg <drosenberg@vsecurity.com>2011-04-05 12:45:59 -0400
committerGreg Kroah-Hartman <gregkh@suse.de>2011-05-09 15:06:35 -0700
commit5c9843ab660296536df95d53f44979bece79a87b (patch)
treefef3743a5a7220b7e08cb2601548f98779ccb6cd /drivers/leds/leds-alix2.c
parentcf546a1fd7fd736f1cd471f059900d477a4b7096 (diff)
mpt2sas: prevent heap overflows and unchecked reads
commit a1f74ae82d133ebb2aabb19d181944b4e83e9960 upstream. At two points in handling device ioctls via /dev/mpt2ctl, user-supplied length values are used to copy data from userspace into heap buffers without bounds checking, allowing controllable heap corruption and subsequently privilege escalation. Additionally, user-supplied values are used to determine the size of a copy_to_user() as well as the offset into the buffer to be read, with no bounds checking, allowing users to read arbitrary kernel memory. Signed-off-by: Dan Rosenberg <drosenberg@vsecurity.com> Acked-by: Eric Moore <eric.moore@lsi.com> Signed-off-by: James Bottomley <James.Bottomley@suse.de> Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Diffstat (limited to 'drivers/leds/leds-alix2.c')
0 files changed, 0 insertions, 0 deletions