Files
linux/net
Vasiliy Kulikov 0308035633 net: packet: fix information leak to userland
[ Upstream commit 67286640f6 ]

packet_getname_spkt() doesn't initialize all members of sa_data field of
sockaddr struct if strlen(dev->name) < 13.  This structure is then copied
to userland.  It leads to leaking of contents of kernel stack memory.
We have to fully fill sa_data with strncpy() instead of strlcpy().

The same with packet_getname(): it doesn't initialize sll_pkttype field of
sockaddr_ll.  Set it to zero.

Signed-off-by: Vasiliy Kulikov <segooon@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
2011-01-07 13:58:29 -08:00
..
2010-10-11 11:05:42 -07:00
2010-10-05 20:35:53 -07:00
2010-12-09 13:33:30 -08:00
2011-01-07 13:58:29 -08:00
2010-07-18 15:07:14 -07:00
2010-06-03 03:21:52 -07:00
2010-05-17 23:23:13 -07:00
2011-01-07 13:58:28 -08:00
2011-01-07 13:58:20 -08:00
2010-04-20 16:37:13 -07:00
2011-01-07 13:58:26 -08:00
2005-04-16 15:20:36 -07:00