xfs: prevent reading uninitialized stack memory
The XFS_IOC_FSGETXATTR ioctl allows unprivileged users to read 12 bytes of uninitialized stack memory, because the fsxattr struct declared on the stack in xfs_ioc_fsgetxattr() does not alter (or zero) the 12-byte fsx_pad member before copying it back to the user. This patch takes care of it. Signed-off-by: Dan Rosenberg <dan.j.rosenberg@gmail.com> Reviewed-by: Eric Sandeen <sandeen@redhat.com> Signed-off-by: Alex Elder <aelder@sgi.com>
This commit is contained in:
parent
cc491e27d3
commit
a122eb2fdf
1 changed files with 2 additions and 0 deletions
|
@ -785,6 +785,8 @@ xfs_ioc_fsgetxattr(
|
||||||
{
|
{
|
||||||
struct fsxattr fa;
|
struct fsxattr fa;
|
||||||
|
|
||||||
|
memset(&fa, 0, sizeof(struct fsxattr));
|
||||||
|
|
||||||
xfs_ilock(ip, XFS_ILOCK_SHARED);
|
xfs_ilock(ip, XFS_ILOCK_SHARED);
|
||||||
fa.fsx_xflags = xfs_ip2xflags(ip);
|
fa.fsx_xflags = xfs_ip2xflags(ip);
|
||||||
fa.fsx_extsize = ip->i_d.di_extsize << ip->i_mount->m_sb.sb_blocklog;
|
fa.fsx_extsize = ip->i_d.di_extsize << ip->i_mount->m_sb.sb_blocklog;
|
||||||
|
|
Loading…
Reference in a new issue