staging/cxt1e1/linux.c: Correct arbitrary memory write in c4_ioctl()
authorSalva Peiró <speiro@ai2.upv.es>
Mon, 3 Mar 2014 07:44:04 +0000 (08:44 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 5 Mar 2014 00:20:01 +0000 (16:20 -0800)
commit084b6e7765b9554699afa23a50e702a3d0ae4b24
tree50efbe4843bc48fd5220b6f02ff1add272431a7e
parent0414855fdc4a40da05221fc6062cccbc0c30f169
staging/cxt1e1/linux.c: Correct arbitrary memory write in c4_ioctl()

The function c4_ioctl() writes data from user in ifr->ifr_data
to the kernel struct data arg, without any iolen bounds checking.
This can lead to a arbitrary write outside of the struct data arg.
Corrected by adding bounds-checking of iolen before the copy_from_user().

Signed-off-by: Salva Peiró <speiro@ai2.upv.es>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/staging/cxt1e1/linux.c