[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <tencent_B406618996EEF22ED6CC8EA7DF46FD92D206@qq.com>
Date: Sat, 9 Aug 2025 17:59:43 +0800
From: Edward Adam Davis <eadavis@...com>
To: syzbot+e8bcd7ee3db6cb5cb875@...kaller.appspotmail.com
Cc: davem@...emloft.net,
herbert@...dor.apana.org.au,
linux-crypto@...r.kernel.org,
linux-kernel@...r.kernel.org,
syzkaller-bugs@...glegroups.com
Subject: [PATCH] crypto: Prevent kernel-infoleak in rng_recvmsg
Initialize the intermediary array member to 0 to prevent the kernel from
leaking uninitialized data to user space.
Reported-by: syzbot+e8bcd7ee3db6cb5cb875@...kaller.appspotmail.com
Closes: https://syzkaller.appspot.com/bug?extid=e8bcd7ee3db6cb5cb875
Tested-by: syzbot+e8bcd7ee3db6cb5cb875@...kaller.appspotmail.com
Signed-off-by: Edward Adam Davis <eadavis@...com>
---
crypto/jitterentropy-kcapi.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/crypto/jitterentropy-kcapi.c b/crypto/jitterentropy-kcapi.c
index c24d4ff2b4a8..9e9e069f55af 100644
--- a/crypto/jitterentropy-kcapi.c
+++ b/crypto/jitterentropy-kcapi.c
@@ -107,7 +107,7 @@ int jent_hash_time(void *hash_state, __u64 time, u8 *addtl,
{
struct shash_desc *hash_state_desc = (struct shash_desc *)hash_state;
SHASH_DESC_ON_STACK(desc, hash_state_desc->tfm);
- u8 intermediary[SHA3_256_DIGEST_SIZE];
+ u8 intermediary[SHA3_256_DIGEST_SIZE] = { 0 };
__u64 j = 0;
int ret;
--
2.43.0
Powered by blists - more mailing lists