Skip to content

Commit b63e908

Browse files
Kees CookKali-
Kees Cook
authored andcommitted
net: ax25: fix information leak to userland harder
commit 5b919f833d9d60588d026ad82d17f17e8872c7a9 upstream. Commit fe10ae53384e48c51996941b7720ee16995cbcb7 adds a memset() to clear the structure being sent back to userspace, but accidentally used the wrong size. Reported-by: Brad Spengler <[email protected]> Signed-off-by: Kees Cook <[email protected]> Signed-off-by: David S. Miller <[email protected]> Signed-off-by: Greg Kroah-Hartman <[email protected]> Signed-off-by: Andi Kleen <[email protected]>
1 parent 2f8577e commit b63e908

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

net/ax25/af_ax25.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1392,7 +1392,7 @@ static int ax25_getname(struct socket *sock, struct sockaddr *uaddr,
13921392
ax25_cb *ax25;
13931393
int err = 0;
13941394

1395-
memset(fsa, 0, sizeof(fsa));
1395+
memset(fsa, 0, sizeof(*fsa));
13961396
lock_sock(sk);
13971397
ax25 = ax25_sk(sk);
13981398

0 commit comments

Comments
 (0)