diff options
author | Hyunwoo Kim <v4bel@theori.io> | 2023-02-09 01:16:48 -0800 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2023-02-13 09:30:14 +0000 |
commit | 2f4796518315ab246638db8feebfcb494212e7ee (patch) | |
tree | 20d28a99237d7c4eb386e9b56f3989d5fc5d757c /net/key | |
parent | 20ab8432420e51f1adce23027121efd5478d0ba3 (diff) | |
download | linux-stable-2f4796518315ab246638db8feebfcb494212e7ee.tar.gz linux-stable-2f4796518315ab246638db8feebfcb494212e7ee.tar.bz2 linux-stable-2f4796518315ab246638db8feebfcb494212e7ee.zip |
af_key: Fix heap information leak
Since x->encap of pfkey_msg2xfrm_state() is not
initialized to 0, kernel heap data can be leaked.
Fix with kzalloc() to prevent this.
Signed-off-by: Hyunwoo Kim <v4bel@theori.io>
Acked-by: Herbert Xu <herbert@gondor.apana.org.au>
Reviewed-by: Sabrina Dubroca <sd@queasysnail.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/key')
-rw-r--r-- | net/key/af_key.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/key/af_key.c b/net/key/af_key.c index 2bdbcec781cd..a815f5ab4c49 100644 --- a/net/key/af_key.c +++ b/net/key/af_key.c @@ -1261,7 +1261,7 @@ static struct xfrm_state * pfkey_msg2xfrm_state(struct net *net, const struct sadb_x_nat_t_type* n_type; struct xfrm_encap_tmpl *natt; - x->encap = kmalloc(sizeof(*x->encap), GFP_KERNEL); + x->encap = kzalloc(sizeof(*x->encap), GFP_KERNEL); if (!x->encap) { err = -ENOMEM; goto out; |