From: Dan Carpenter Date: Thu, 14 Jul 2016 11:16:53 +0000 (+0300) Subject: wan/fsl_ucc_hdlc: info leak in uhdlc_ioctl() X-Git-Tag: v4.8-rc1~140^2~114 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=2f43b9beeac8e063353452b4bcf8712f6c2de27b;p=platform%2Fkernel%2Flinux-exynos.git wan/fsl_ucc_hdlc: info leak in uhdlc_ioctl() There is a 2 byte struct whole after line.loopback so we need to clear that out to avoid disclosing stack information. Fixes: c19b6d246a35 ('drivers/net: support hdlc function for QE-UCC') Signed-off-by: Dan Carpenter Signed-off-by: David S. Miller --- diff --git a/drivers/net/wan/fsl_ucc_hdlc.c b/drivers/net/wan/fsl_ucc_hdlc.c index 19174ac..6edd48a 100644 --- a/drivers/net/wan/fsl_ucc_hdlc.c +++ b/drivers/net/wan/fsl_ucc_hdlc.c @@ -635,9 +635,8 @@ static int uhdlc_ioctl(struct net_device *dev, struct ifreq *ifr, int cmd) ifr->ifr_settings.size = size; /* data size wanted */ return -ENOBUFS; } + memset(&line, 0, sizeof(line)); line.clock_type = priv->clocking; - line.clock_rate = 0; - line.loopback = 0; if (copy_to_user(ifr->ifr_settings.ifs_ifsu.sync, &line, size)) return -EFAULT;