[PATCH 2/2] net: ax25: fix information leak to userland harder
Andy Whitcroft
apw at canonical.com
Mon Jan 31 17:59:15 UTC 2011
From: Kees Cook <kees.cook at canonical.com>
Commit fe10ae53384e48c51996941b7720ee16995cbcb7 adds a memset() to clear
the structure being sent back to userspace, but accidentally used the
wrong size.
Reported-by: Brad Spengler <spender at grsecurity.net>
Signed-off-by: Kees Cook <kees.cook at canonical.com>
Cc: stable at kernel.org
Signed-off-by: David S. Miller <davem at davemloft.net>
CVE-2010-3875
BugLink: http://bugs.launchpad.net/bugs/710714
(cherry picked from commit 5b919f833d9d60588d026ad82d17f17e8872c7a9 upstream)
Signed-off-by: Andy Whitcroft <apw at canonical.com>
---
net/ax25/af_ax25.c | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/net/ax25/af_ax25.c b/net/ax25/af_ax25.c
index 6e2371a..763fd0b 100644
--- a/net/ax25/af_ax25.c
+++ b/net/ax25/af_ax25.c
@@ -1392,7 +1392,7 @@ static int ax25_getname(struct socket *sock, struct sockaddr *uaddr,
ax25_cb *ax25;
int err = 0;
- memset(fsa, 0, sizeof(fsa));
+ memset(fsa, 0, sizeof(*fsa));
lock_sock(sk);
ax25 = ax25_sk(sk);
--
1.7.1
More information about the kernel-team
mailing list