linux/net/bluetooth/hidp
Vasiliy Kulikov d31dbf6e59 Bluetooth: hidp: fix information leak to userland
Structure hidp_conninfo is copied to userland with version, product,
vendor and name fields unitialized if both session->input and session->hid
are NULL.  It leads to leaking of contents of kernel stack memory.

Signed-off-by: Vasiliy Kulikov <segooon@gmail.com>
Acked-by: Marcel Holtmann <marcel@holtmann.org>
Signed-off-by: Gustavo F. Padovan <padovan@profusion.mobi>
2010-12-01 21:04:36 -02:00
..
Kconfig Bluetooth: fix hidp kconfig dependency warning 2010-11-09 00:55:27 -02:00
Makefile
core.c Bluetooth: hidp: fix information leak to userland 2010-12-01 21:04:36 -02:00
hidp.h net: sk_sleep() helper 2010-04-20 16:37:13 -07:00
sock.c include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h 2010-03-30 22:02:32 +09:00