From: Hyunwoo Kim Date: Thu, 9 Feb 2023 09:16:48 +0000 (-0800) Subject: af_key: Fix heap information leak X-Git-Tag: v6.6.7~3569^2~16 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=2f4796518315ab246638db8feebfcb494212e7ee;p=platform%2Fkernel%2Flinux-starfive.git af_key: Fix heap information leak Since x->encap of pfkey_msg2xfrm_state() is not initialized to 0, kernel heap data can be leaked. Fix with kzalloc() to prevent this. Signed-off-by: Hyunwoo Kim Acked-by: Herbert Xu Reviewed-by: Sabrina Dubroca Signed-off-by: David S. Miller --- diff --git a/net/key/af_key.c b/net/key/af_key.c index 2bdbcec..a815f5a 100644 --- a/net/key/af_key.c +++ b/net/key/af_key.c @@ -1261,7 +1261,7 @@ static struct xfrm_state * pfkey_msg2xfrm_state(struct net *net, const struct sadb_x_nat_t_type* n_type; struct xfrm_encap_tmpl *natt; - x->encap = kmalloc(sizeof(*x->encap), GFP_KERNEL); + x->encap = kzalloc(sizeof(*x->encap), GFP_KERNEL); if (!x->encap) { err = -ENOMEM; goto out;