Dan Carpenter 4c41aa24ba staging: ncpfs: memory corruption in ncp_read_kernel()
If the server is malicious then *bytes_read could be larger than the
size of the "target" buffer.  It would lead to memory corruption when we
do the memcpy().

Reported-by: Dr Silvio Cesare of InfoSect <Silvio Cesare <silvio.cesare@gmail.com>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable <stable@vger.kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-03-19 16:31:39 +01:00
..
2018-02-22 12:05:43 -08:00
2017-11-13 20:53:28 -08:00
2018-02-01 09:51:57 -08:00
2018-02-01 09:51:57 -08:00
2018-02-01 11:45:49 -08:00
2018-02-01 09:51:57 -08:00