On Thu, Nov 23, 2017 at 04:20:05PM +0100, Oliver Neukum wrote:
> Parsing CDC headers a buffer overflow cannot just be prevented
> by checking that the remainder of the buffer is longer than minimum
> length. The size of the fields to be parsed must be figured in, too.
> 
> In newer kernels this issue has been fixed at a central location with
> 
> commit 2e1c42391ff2556387b3cb6308b24f6f65619feb
> Author: Greg Kroah-Hartman <gre...@linuxfoundation.org>
> Date:   Thu Sep 21 16:58:48 2017 +0200
> 
>     USB: core: harden cdc_parse_cdc_header
> 
> on anything older the parsing had not been centralised, so a separate
> fix for each driver is necessary.
> 
> Signed-off-by: Oliver Neukum <oneu...@suse.com>
> ---
>  drivers/net/usb/cdc_ether.c | 9 ++++++++-
>  drivers/usb/class/cdc-acm.c | 2 +-
>  drivers/usb/class/cdc-wdm.c | 2 ++
>  3 files changed, 11 insertions(+), 2 deletions(-)

What stable kernel(s) should this go to?

thanks,

greg k-h
--
To unsubscribe from this list: send the line "unsubscribe linux-usb" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to