linux/net/tipc
Kulikov Vasiliy 88f8a5e3e7 net: tipc: fix information leak to userland
Structure sockaddr_tipc is copied to userland with padding bytes after
"id" field in union field "name" unitialized.  It leads to leaking of
contents of kernel stack memory.  We have to initialize them to zero.

Signed-off-by: Vasiliy Kulikov <segooon@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2010-11-09 09:25:46 -08:00
..
addr.c
addr.h
bcast.c
bcast.h
bearer.c tipc: delete needless memset from bearer enabling. 2010-10-21 04:25:51 -07:00
bearer.h
cluster.c
cluster.h
config.c
config.h
core.c tipc: Kill tipc_get_mode() completely. 2010-10-18 01:06:20 -07:00
core.h
dbg.c
dbg.h
discover.c
discover.h
eth_media.c
handler.c
Kconfig
link.c
link.h
Makefile
msg.c
msg.h
name_distr.c
name_distr.h
name_table.c
name_table.h
net.c
net.h
netlink.c
node.c
node.h
node_subscr.c
node_subscr.h
port.c
port.h
ref.c
ref.h
socket.c net: tipc: fix information leak to userland 2010-11-09 09:25:46 -08:00
subscr.c Merge branch 'master' of master.kernel.org:/pub/scm/linux/kernel/git/davem/net-2.6 2010-10-21 08:43:05 -07:00
subscr.h Revert d88dca79d3 2010-10-21 04:11:08 -07:00
user_reg.c
user_reg.h
zone.c
zone.h