Re: [PATCH] [stable only]USB: fix buffer overflows with parsing CDC headers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Nov 23, 2017 at 04:20:05PM +0100, Oliver Neukum wrote:
> Parsing CDC headers a buffer overflow cannot just be prevented
> by checking that the remainder of the buffer is longer than minimum
> length. The size of the fields to be parsed must be figured in, too.
> 
> In newer kernels this issue has been fixed at a central location with
> 
> commit 2e1c42391ff2556387b3cb6308b24f6f65619feb
> Author: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
> Date:   Thu Sep 21 16:58:48 2017 +0200
> 
>     USB: core: harden cdc_parse_cdc_header
> 
> on anything older the parsing had not been centralised, so a separate
> fix for each driver is necessary.
> 
> Signed-off-by: Oliver Neukum <oneukum@xxxxxxxx>
> ---
>  drivers/net/usb/cdc_ether.c | 9 ++++++++-
>  drivers/usb/class/cdc-acm.c | 2 +-
>  drivers/usb/class/cdc-wdm.c | 2 ++
>  3 files changed, 11 insertions(+), 2 deletions(-)

What stable kernel(s) should this go to?

thanks,

greg k-h
--
To unsubscribe from this list: send the line "unsubscribe linux-usb" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux Media]     [Linux Input]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [Old Linux USB Devel Archive]

  Powered by Linux