summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorWillem de Bruijn <willemb@google.com>2015-01-15 13:18:40 -0500
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2015-02-26 17:49:00 -0800
commit8e9f6bdb35ae63a83ab8d0338eb13d72d596aba5 (patch)
tree03d10b14e7dd3f0f05355869e55417bfebc6cc69 /security
parenta17f9bf1f7cd3412b9920577a7c0ec34cb81b233 (diff)
ip: zero sockaddr returned on error queue
[ Upstream commit f812116b174e59a350acc8e4856213a166a91222 ] The sockaddr is returned in IP(V6)_RECVERR as part of errhdr. That structure is defined and allocated on the stack as struct { struct sock_extended_err ee; struct sockaddr_in(6) offender; } errhdr; The second part is only initialized for certain SO_EE_ORIGIN values. Always initialize it completely. An MTU exceeded error on a SOCK_RAW/IPPROTO_RAW is one example that would return uninitialized bytes. Signed-off-by: Willem de Bruijn <willemb@google.com> ---- Also verified that there is no padding between errhdr.ee and errhdr.offender that could leak additional kernel data. Acked-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions