Bluetooth: hidp: NUL terminate a string in the compat ioctl
authorDan Carpenter <dan.carpenter@oracle.com>
Thu, 16 May 2019 18:24:00 +0000 (21:24 +0300)
committerMarcel Holtmann <marcel@holtmann.org>
Sat, 6 Jul 2019 11:07:41 +0000 (13:07 +0200)
commitdcae9052ebb0c5b2614de620323d615fcbfda7f8
tree88c970ef166cff7817c2b060dc6bdfc711426532
parent44d34af2e4cfd0c5357182f8b43f3e0a1fe30a2e
Bluetooth: hidp: NUL terminate a string in the compat ioctl

This change is similar to commit a1616a5ac99e ("Bluetooth: hidp: fix
buffer overflow") but for the compat ioctl.  We take a string from the
user and forgot to ensure that it's NUL terminated.

I have also changed the strncpy() in to strscpy() in hidp_setup_hid().
The difference is the strncpy() doesn't necessarily NUL terminate the
destination string.  Either change would fix the problem but it's nice
to take a belt and suspenders approach and do both.

Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
net/bluetooth/hidp/core.c
net/bluetooth/hidp/sock.c