diff options
author | Eric Dumazet <eric.dumazet@gmail.com> | 2009-06-08 03:49:24 +0000 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2009-06-09 05:11:42 -0700 |
commit | 0c27922e4933ceb86644f4a9b1af212ffe5aad75 (patch) | |
tree | 41d2add3d419269c5802c0b22e7552c3fa677eb9 /net/core/sock.c | |
parent | ebc8d2ab61dde6cf775ae7bb1ed9e38dfe12ca65 (diff) |
net: dev_addr_init() fix
commit f001fde5eadd915f4858d22ed70d7040f48767cf
(net: introduce a list of device addresses dev_addr_list (v6))
added one regression Vegard Nossum found in its testings.
With kmemcheck help, Vegard found some uninitialized memory
was read and reported to user, potentialy leaking kernel data.
( thread can be found on http://lkml.org/lkml/2009/5/30/177 )
dev_addr_init() incorrectly uses sizeof() operator. We were
initializing one byte instead of MAX_ADDR_LEN bytes.
Reported-by: Vegard Nossum <vegard.nossum@gmail.com>
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
Acked-by: Jiri Pirko <jpirko@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/core/sock.c')
0 files changed, 0 insertions, 0 deletions