[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20251101-infoleak-v2-0-01a501d41c09@gmail.com>
Date: Sat, 01 Nov 2025 18:04:46 +0530
From: Ranganath V N <vnranganath.20@...il.com>
To: Jamal Hadi Salim <jhs@...atatu.com>,
Cong Wang <xiyou.wangcong@...il.com>, Jiri Pirko <jiri@...nulli.us>,
"David S. Miller" <davem@...emloft.net>, Eric Dumazet <edumazet@...gle.com>,
Jakub Kicinski <kuba@...nel.org>, Paolo Abeni <pabeni@...hat.com>,
Simon Horman <horms@...nel.org>
Cc: netdev@...r.kernel.org, linux-kernel@...r.kernel.org,
skhan@...uxfoundation.org, david.hunter.linux@...il.com, khalid@...nel.org,
Ranganath V N <vnranganath.20@...il.com>,
syzbot+0c85cae3350b7d486aee@...kaller.appspotmail.com
Subject: [PATCH v2 0/2] net: sched: act_ife: initialize struct tc_ife to
fix KMSAN kernel-infoleak
Fix a KMSAN kernel-infoleak detected by the syzbot .
[net?] KMSAN: kernel-infoleak in __skb_datagram_iter
In tcf_ife_dump(), the variable 'opt' was partially initialized using a
designatied initializer. While the padding bytes are reamined
uninitialized. nla_put() copies the entire structure into a
netlink message, these uninitialized bytes leaked to userspace.
Initialize the structure with memset before assigning its fields
to ensure all members and padding are cleared prior to beign copied.
Signed-off-by: Ranganath V N <vnranganath.20@...il.com>
---
Changes in v2:
- removed memset(&t, 0, sizeof(t)) from previous patch.
- added the new patch series to address the issue.
- Link to v1: https://lore.kernel.org/r/20251031-infoleak-v1-1-9f7250ee33aa@gmail.com
---
Ranganath V N (2):
net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak
net: sched: act_connmark: zero initialize the struct to avoid KMSAN
net/sched/act_connmark.c | 12 +++++++-----
net/sched/act_ife.c | 12 +++++++-----
2 files changed, 14 insertions(+), 10 deletions(-)
---
base-commit: d127176862a93c4b3216bda533d2bee170af5e71
change-id: 20251031-infoleak-8a7de6afc987
Best regards,
--
Ranganath V N <vnranganath.20@...il.com>
Powered by blists - more mailing lists