From: Dan Carpenter Date: Mon, 17 Feb 2014 19:56:06 +0000 (+0300) Subject: staging/bcm: two information leaks in ioctl X-Git-Tag: firefly_0821_release~176^2~4193^2~1005 X-Git-Url: http://demsky.eecs.uci.edu/git/?a=commitdiff_plain;h=cfff3e5c8d2139c38d40d90e3d9fc13721222076;hp=4e5e9d7c66f045558d5f70f640de0093fcd875e8;p=firefly-linux-kernel-4.4.55.git staging/bcm: two information leaks in ioctl There are a couple paths where we don't check how much data we copy back to the user. Cc: Dave Jones Signed-off-by: Dan Carpenter Signed-off-by: Greg Kroah-Hartman --- diff --git a/drivers/staging/bcm/Bcmchar.c b/drivers/staging/bcm/Bcmchar.c index fdebc3bba0b5..6f1997dc44c8 100644 --- a/drivers/staging/bcm/Bcmchar.c +++ b/drivers/staging/bcm/Bcmchar.c @@ -590,6 +590,8 @@ static int bcm_char_ioctl_gpio_multi_request(void __user *argp, struct bcm_mini_ if (IoBuffer.InputLength > sizeof(gpio_multi_info)) return -EINVAL; + if (IoBuffer.OutputLength > sizeof(gpio_multi_info)) + IoBuffer.OutputLength = sizeof(gpio_multi_info); if (copy_from_user(&gpio_multi_info, IoBuffer.InputBuffer, IoBuffer.InputLength)) return -EFAULT; @@ -680,6 +682,8 @@ static int bcm_char_ioctl_gpio_mode_request(void __user *argp, struct bcm_mini_a if (IoBuffer.InputLength > sizeof(gpio_multi_mode)) return -EINVAL; + if (IoBuffer.OutputLength > sizeof(gpio_multi_mode)) + IoBuffer.OutputLength = sizeof(gpio_multi_mode); if (copy_from_user(&gpio_multi_mode, IoBuffer.InputBuffer, IoBuffer.InputLength)) return -EFAULT;