ipv4: netfilter: ip_tables: fix information leak to userland
Structure ipt_getinfo is copied to userland with the field "name" that has the last elements unitialized. It leads to leaking of contents of kernel stack memory. Signed-off-by: Vasiliy Kulikov <segooon@gmail.com> Signed-off-by: Patrick McHardy <kaber@trash.net>
This commit is contained in:
parent
1a8b7a6722
commit
b5f15ac4f8
@ -1124,6 +1124,7 @@ static int get_info(struct net *net, void __user *user,
|
||||
private = &tmp;
|
||||
}
|
||||
#endif
|
||||
memset(&info, 0, sizeof(info));
|
||||
info.valid_hooks = t->valid_hooks;
|
||||
memcpy(info.hook_entry, private->hook_entry,
|
||||
sizeof(info.hook_entry));
|
||||
|
Loading…
Reference in New Issue
Block a user