diff options
author | 2020-07-31 00:48:38 -0400 | |
---|---|---|
committer | 2020-08-03 15:09:44 -0700 | |
commit | 9aba6c5b49254d5bee927d81593ed4429e91d4ae (patch) | |
tree | 463c4df1b2822faca26695301e0b30f2fa095c55 /net/ethtool/linkmodes.c | |
parent | net/sched: act_ct: fix miss set mru for ovs after defrag in act_ct (diff) | |
download | linux-rng-9aba6c5b49254d5bee927d81593ed4429e91d4ae.tar.xz linux-rng-9aba6c5b49254d5bee927d81593ed4429e91d4ae.zip |
openvswitch: Prevent kernel-infoleak in ovs_ct_put_key()
ovs_ct_put_key() is potentially copying uninitialized kernel stack memory
into socket buffers, since the compiler may leave a 3-byte hole at the end
of `struct ovs_key_ct_tuple_ipv4` and `struct ovs_key_ct_tuple_ipv6`. Fix
it by initializing `orig` with memset().
Fixes: 9dd7f8907c37 ("openvswitch: Add original direction conntrack tuple to sw_flow_key.")
Suggested-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Peilin Ye <yepeilin.cs@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/ethtool/linkmodes.c')
0 files changed, 0 insertions, 0 deletions