Files
kernel/crypto
Eric Biggers a0f044f025 crypto: user - fix leaking uninitialized memory to userspace
commit f43f39958beb206b53292801e216d9b8a660f087 upstream.

All bytes of the NETLINK_CRYPTO report structures must be initialized,
since they are copied to userspace.  The change from strncpy() to
strlcpy() broke this.  As a minimal fix, change it back.

Fixes: 4473710df1 ("crypto: user - Prepare for CRYPTO_MAX_ALG_NAME expansion")
Cc: <stable@vger.kernel.org> # v4.12+
Signed-off-by: Eric Biggers <ebiggers@google.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-11-21 09:19:24 +01:00
..
2018-06-18 20:17:38 +05:30
2018-11-04 14:50:51 +01:00
2018-05-26 09:16:44 +02:00
2018-05-26 09:16:44 +02:00
2017-11-03 21:35:35 +08:00
2018-04-21 00:58:34 +08:00
2018-04-21 00:58:34 +08:00
2018-04-21 00:58:34 +08:00
2018-04-21 00:58:34 +08:00
2018-07-20 13:51:21 +08:00
2018-11-13 11:08:46 -08:00
2018-11-13 11:08:46 -08:00
2018-04-21 00:58:34 +08:00
2018-05-16 07:23:35 +02:00
2018-11-13 11:08:46 -08:00
2018-11-13 11:08:46 -08:00
2018-04-21 00:58:30 +08:00