From: Mathias Krause Date: Sat, 9 Mar 2013 05:52:20 +0000 (+0000) Subject: rtnl: fix info leak on RTM_GETLINK request for VF devices X-Git-Tag: v3.9-rc3~36^2~3 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=84d73cd3fb142bf1298a8c13fd4ca50fd2432372;p=platform%2Fkernel%2Flinux-exynos.git rtnl: fix info leak on RTM_GETLINK request for VF devices Initialize the mac address buffer with 0 as the driver specific function will probably not fill the whole buffer. In fact, all in-kernel drivers fill only ETH_ALEN of the MAX_ADDR_LEN bytes, i.e. 6 of the 32 possible bytes. Therefore we currently leak 26 bytes of stack memory to userland via the netlink interface. Signed-off-by: Mathias Krause Signed-off-by: David S. Miller --- diff --git a/net/core/rtnetlink.c b/net/core/rtnetlink.c index b376410..a585d45 100644 --- a/net/core/rtnetlink.c +++ b/net/core/rtnetlink.c @@ -979,6 +979,7 @@ static int rtnl_fill_ifinfo(struct sk_buff *skb, struct net_device *dev, * report anything. */ ivi.spoofchk = -1; + memset(ivi.mac, 0, sizeof(ivi.mac)); if (dev->netdev_ops->ndo_get_vf_config(dev, i, &ivi)) break; vf_mac.vf =