net: ax25: fix information leak to userland harder
commit 5b919f833d9d60588d026ad82d17f17e8872c7a9 upstream. Commit fe10ae53384e48c51996941b7720ee16995cbcb7 adds a memset() to clear the structure being sent back to userspace, but accidentally used the wrong size. Reported-by: Brad Spengler <spender@grsecurity.net> Signed-off-by: Kees Cook <kees.cook@canonical.com> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
This commit is contained in:
parent
1fe7a67d02
commit
6b1c3b60a4
@ -1392,7 +1392,7 @@ static int ax25_getname(struct socket *sock, struct sockaddr *uaddr,
|
||||
ax25_cb *ax25;
|
||||
int err = 0;
|
||||
|
||||
memset(fsa, 0, sizeof(fsa));
|
||||
memset(fsa, 0, sizeof(*fsa));
|
||||
lock_sock(sk);
|
||||
ax25 = ax25_sk(sk);
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user