Description
In the Linux kernel, the following vulnerability has been resolved: Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak Struct ff_effect_compat is embedded twice inside uinput_ff_upload_compat, contains internal padding. In particular, there is a hole after struct ff_replay to satisfy alignment requirements for the following union member. Without clearing the structure, copy_to_user() may leak stack data to userspace. Initialize ff_up_compat to zero before filling valid fields.
Product status
2d56f3a32c0e62f99c043d2579840f9731fe5855 (git) before 1b317796013f666ae5040edbf0f230ec61496d42
2d56f3a32c0e62f99c043d2579840f9731fe5855 (git) before 877172b97786ed1678640dff0b2d35abb328844c
2d56f3a32c0e62f99c043d2579840f9731fe5855 (git) before e63aade22a33e77b93c98c9f02db504d897a76b4
2d56f3a32c0e62f99c043d2579840f9731fe5855 (git) before 933b87c4590b42500299f00ff55f555903056803
2d56f3a32c0e62f99c043d2579840f9731fe5855 (git) before fd8a23ecbc602d00e47b27f20b07350867d0ebe5
2d56f3a32c0e62f99c043d2579840f9731fe5855 (git) before 48c96b7e9e03516936d6deba54b5553097eae817
2d56f3a32c0e62f99c043d2579840f9731fe5855 (git) before f5e1f3b85aadce74268c46676772c3e9fa79897e
2d56f3a32c0e62f99c043d2579840f9731fe5855 (git) before d3366a04770eea807f2826cbdb96934dd8c9bf79
2.6.29
Any version before 2.6.29
5.4.301 (semver)
5.10.246 (semver)
5.15.195 (semver)
6.1.156 (semver)
6.6.112 (semver)
6.12.53 (semver)
6.17.3 (semver)
6.18-rc1 (original_commit_for_fix)
References
git.kernel.org/...c/1b317796013f666ae5040edbf0f230ec61496d42
git.kernel.org/...c/877172b97786ed1678640dff0b2d35abb328844c
git.kernel.org/...c/e63aade22a33e77b93c98c9f02db504d897a76b4
git.kernel.org/...c/933b87c4590b42500299f00ff55f555903056803
git.kernel.org/...c/fd8a23ecbc602d00e47b27f20b07350867d0ebe5
git.kernel.org/...c/48c96b7e9e03516936d6deba54b5553097eae817
git.kernel.org/...c/f5e1f3b85aadce74268c46676772c3e9fa79897e
git.kernel.org/...c/d3366a04770eea807f2826cbdb96934dd8c9bf79