diff options
author | Alexander Aring <aring@mojatatu.com> | 2018-04-20 14:54:13 -0400 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2018-12-01 09:43:00 +0100 |
commit | 57ccd1fc8ebbd656594354ab0213754fcda03bde (patch) | |
tree | a000ddeb69b08f739057d751b629a6d223cb9712 /security/integrity | |
parent | 077506972ba23772b752e08b1ab7052cf5f04511 (diff) |
net: ieee802154: 6lowpan: fix frag reassembly
commit f18fa5de5ba7f1d6650951502bb96a6e4715a948 upstream.
This patch initialize stack variables which are used in
frag_lowpan_compare_key to zero. In my case there are padding bytes in the
structures ieee802154_addr as well in frag_lowpan_compare_key. Otherwise
the key variable contains random bytes. The result is that a compare of
two keys by memcmp works incorrect.
Fixes: 648700f76b03 ("inet: frags: use rhashtables for reassembly units")
Signed-off-by: Alexander Aring <aring@mojatatu.com>
Reported-by: Stefan Schmidt <stefan@osg.samsung.com>
Signed-off-by: Stefan Schmidt <stefan@osg.samsung.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'security/integrity')
0 files changed, 0 insertions, 0 deletions