net: tipc: fix information leak to userland
commite4eec22e3501a2d6a0bf583f5c34cc1fcc6f5a91
authorKulikov Vasiliy <segooon@gmail.com>
Sun, 31 Oct 2010 07:10:32 +0000 (31 07:10 +0000)
committerWilly Tarreau <w@1wt.eu>
Sat, 30 Apr 2011 14:53:34 +0000 (30 16:53 +0200)
tree3695d291ce4a4c5f6499a037e4614369fd1d7e5e
parentf25d8e502520fcc99f9eb442d76391365dea7ecf
net: tipc: fix information leak to userland

commit 88f8a5e3e7defccd3925cabb1ee4d3994e5cdb52 upstream.

Structure sockaddr_tipc is copied to userland with padding bytes after
"id" field in union field "name" unitialized.  It leads to leaking of
contents of kernel stack memory.  We have to initialize them to zero.

Signed-off-by: Vasiliy Kulikov <segooon@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Cc: Moritz Muehlenhoff <jmm@debian.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
net/tipc/socket.c