net: sctp: prevent writes to cookie_hmac_alg from accessing invalid memory
authorSasha Levin <sasha.levin@oracle.com>
Thu, 7 Jan 2016 19:52:43 +0000 (14:52 -0500)
committerDavid S. Miller <davem@davemloft.net>
Sun, 10 Jan 2016 23:01:01 +0000 (18:01 -0500)
proc_dostring() needs an initialized destination string, while the one
provided in proc_sctp_do_hmac_alg() contains stack garbage.

Thus, writing to cookie_hmac_alg would strlen() that garbage and end up
accessing invalid memory.

Fixes: 3c68198e7 ("sctp: Make hmac algorithm selection for cookie generation dynamic")
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/sctp/sysctl.c

index 26d50c565f54223ec28d29358932227b4b22acd1..3e0fc51272259a5de5251391405cf2927f95611d 100644 (file)
@@ -320,7 +320,7 @@ static int proc_sctp_do_hmac_alg(struct ctl_table *ctl, int write,
        struct ctl_table tbl;
        bool changed = false;
        char *none = "none";
-       char tmp[8];
+       char tmp[8] = {0};
        int ret;
 
        memset(&tbl, 0, sizeof(struct ctl_table));