ipc: shm: fix information leak to userland
The shmid_ds structure is copied to userland with shm_unused{,2,3}
fields unitialized. It leads to leaking of contents of kernel stack
memory.
Signed-off-by:
Vasiliy Kulikov <segooon@gmail.com>
Acked-by:
Al Viro <viro@ZenIV.linux.org.uk>
Cc: stable@kernel.org
Signed-off-by:
Linus Torvalds <torvalds@linux-foundation.org>
Loading
Please register or sign in to comment