Files
linux/net
Mathias Krause 2ed1aeaca7 xfrm_user: fix info leak in copy_to_user_auth()
[ Upstream commit 4c87308bde ]

copy_to_user_auth() fails to initialize the remainder of alg_name and
therefore discloses up to 54 bytes of heap memory via netlink to
userland.

Use strncpy() instead of strcpy() to fill the trailing bytes of alg_name
with null bytes.

Signed-off-by: Mathias Krause <minipli@googlemail.com>
Acked-by: Steffen Klassert <steffen.klassert@secunet.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2012-10-13 05:28:04 +09:00
..
2011-05-23 16:29:24 -04:00
2012-10-02 09:47:06 -07:00
2011-11-11 09:36:45 -08:00
2011-07-19 11:25:04 -07:00
2011-03-14 17:02:42 -07:00
2011-03-17 11:59:32 +11:00
2011-03-21 18:16:39 -07:00
2011-05-24 01:13:12 -04:00
2012-10-02 09:47:21 -07:00
2012-08-15 12:04:11 -07:00
2012-10-02 09:47:41 -07:00
2011-05-24 01:13:12 -04:00
2011-05-05 11:10:14 -07:00
2011-04-29 10:20:53 -07:00
2010-10-15 15:53:27 +02:00