Commit 7a3b6843 by Dan Carpenter Committed by David S. Miller

netrom: info leak in ->getname()

The sockaddr_ax25 struct has a 3 byte hole between ->sax25_call and ->sax25_ndigis. I've added a memset to avoid leaking uninitialized stack data to userspace. Signed-off-by: 's avatarDan Carpenter <dan.carpenter@oracle.com> Acked-by: 's avatarRalf Baechle <ralf@linux-mips.org> Signed-off-by: 's avatarDavid S. Miller <davem@davemloft.net>
parent fccc9f1f
......@@ -834,6 +834,8 @@ static int nr_getname(struct socket *sock, struct sockaddr *uaddr,
struct sock *sk = sock->sk;
struct nr_sock *nr = nr_sk(sk);
memset(&sax->fsa_ax25, 0, sizeof(struct sockaddr_ax25));
lock_sock(sk);
if (peer != 0) {
if (sk->sk_state != TCP_ESTABLISHED) {
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment