mirror of
https://github.com/veracrypt/VeraCrypt.git
synced 2025-11-11 11:08:02 -06:00
Windows vulnerability fix : avoid kernel pointer disclosure through a call to TC_IOCTL_GET_SYSTEM_DRIVE_DUMP_CONFIG but restricting this call to Kernel Mode.
This commit is contained in:
@@ -1504,7 +1504,9 @@ NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Ex
|
|||||||
break;
|
break;
|
||||||
|
|
||||||
case TC_IOCTL_GET_SYSTEM_DRIVE_DUMP_CONFIG:
|
case TC_IOCTL_GET_SYSTEM_DRIVE_DUMP_CONFIG:
|
||||||
if (ValidateIOBufferSize (Irp, sizeof (GetSystemDriveDumpConfigRequest), ValidateOutput))
|
if ( (ValidateIOBufferSize (Irp, sizeof (GetSystemDriveDumpConfigRequest), ValidateOutput))
|
||||||
|
&& (Irp->RequestorMode == KernelMode)
|
||||||
|
)
|
||||||
{
|
{
|
||||||
GetSystemDriveDumpConfigRequest *request = (GetSystemDriveDumpConfigRequest *) Irp->AssociatedIrp.SystemBuffer;
|
GetSystemDriveDumpConfigRequest *request = (GetSystemDriveDumpConfigRequest *) Irp->AssociatedIrp.SystemBuffer;
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user