usbip: prevent vhci_hcd driver from leaking a socket pointer address
authorShuah Khan <shuahkh@osg.samsung.com>
Thu, 7 Dec 2017 21:16:49 +0000 (14:16 -0700)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 8 Dec 2017 16:32:23 +0000 (17:32 +0100)
commit2f2d0088eb93db5c649d2a5e34a3800a8a935fc5
treeeb94be1cc6a34b0230112e8c1154d8d646e04fb8
parentc6688ef9f29762e65bce325ef4acd6c675806366
usbip: prevent vhci_hcd driver from leaking a socket pointer address

When a client has a USB device attached over IP, the vhci_hcd driver is
locally leaking a socket pointer address via the

/sys/devices/platform/vhci_hcd/status file (world-readable) and in debug
output when "usbip --debug port" is run.

Fix it to not leak. The socket pointer address is not used at the moment
and it was made visible as a convenient way to find IP address from socket
pointer address by looking up /proc/net/{tcp,tcp6}.

As this opens a security hole, the fix replaces socket pointer address with
sockfd.

Reported-by: Secunia Research <vuln@secunia.com>
Cc: stable <stable@vger.kernel.org>
Signed-off-by: Shuah Khan <shuahkh@osg.samsung.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/usb/usbip/usbip_common.h
drivers/usb/usbip/vhci_sysfs.c
tools/usb/usbip/libsrc/vhci_driver.c