af_packet: prevent information leak
authorEric Dumazet <eric.dumazet@gmail.com>
Tue, 7 Jun 2011 05:42:06 +0000 (22:42 -0700)
committerWilly Tarreau <w@1wt.eu>
Sat, 11 Feb 2012 14:40:47 +0000 (15:40 +0100)
[ Upstream commit 13fcb7bd322164c67926ffe272846d4860196dc6 ]

In 2.6.27, commit 393e52e33c6c2 (packet: deliver VLAN TCI to userspace)
added a small information leak.

Add padding field and make sure its zeroed before copy to user.

Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
CC: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Signed-off-by: Willy Tarreau <w@1wt.eu>
include/linux/if_packet.h
net/packet/af_packet.c

index 18db0668065a61c6e5af363f3db50ddd1d5b629a..025ec33fbc82bbb1f14f2860982bead9aaea25e5 100644 (file)
@@ -61,6 +61,7 @@ struct tpacket_auxdata
        __u16           tp_mac;
        __u16           tp_net;
        __u16           tp_vlan_tci;
+       __u16           tp_padding;
 };
 
 struct tpacket_hdr
@@ -93,6 +94,7 @@ struct tpacket2_hdr
        __u32           tp_sec;
        __u32           tp_nsec;
        __u16           tp_vlan_tci;
+       __u16           tp_padding;
 };
 
 #define TPACKET2_HDRLEN                (TPACKET_ALIGN(sizeof(struct tpacket2_hdr)) + sizeof(struct sockaddr_ll))
index 45dfb9476295df02589f1e27681390eb294ea1c5..150dd52b7e32e02204a4f2d78743c7adbf862668 100644 (file)
@@ -708,6 +708,7 @@ static int tpacket_rcv(struct sk_buff *skb, struct net_device *dev, struct packe
                h.h2->tp_sec = ts.tv_sec;
                h.h2->tp_nsec = ts.tv_nsec;
                h.h2->tp_vlan_tci = skb->vlan_tci;
+               h.h2->tp_padding = 0;
                hdrlen = sizeof(*h.h2);
                break;
        default:
@@ -1181,6 +1182,7 @@ static int packet_recvmsg(struct kiocb *iocb, struct socket *sock,
                aux.tp_net = skb_network_offset(skb);
                aux.tp_vlan_tci = skb->vlan_tci;
 
+               aux.tp_padding = 0;
                put_cmsg(msg, SOL_PACKET, PACKET_AUXDATA, sizeof(aux), &aux);
        }