Vasiliy Kulikov eca67aaeeb usb: misc: iowarrior: fix information leak to userland
Structure iowarrior_info is copied to userland with padding byted
between "serial" and "revision" fields uninitialized.  It leads to
leaking of contents of kernel stack memory.

Signed-off-by: Vasiliy Kulikov <segooon@gmail.com>
Cc: stable <stable@kernel.org>
Acked-by: Kees Cook <kees.cook@canonical.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
2010-11-11 07:14:07 -08:00
..
2010-11-06 07:49:56 -07:00
2010-10-29 00:29:51 +02:00
2010-10-29 04:16:28 -04:00
2010-10-28 20:31:50 +02:00
2010-10-30 08:31:35 -07:00
2010-10-29 04:16:28 -04:00