mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2025-01-07 21:53:44 +00:00
CAN: Use inode instead of kernel address for /proc file
commit 9f260e0efa
upstream.
Since the socket address is just being used as a unique identifier, its
inode number is an alternative that does not leak potentially sensitive
information.
CC-ing stable because MITRE has assigned CVE-2010-4565 to the issue.
Signed-off-by: Dan Rosenberg <drosenberg@vsecurity.com>
Acked-by: Oliver Hartkopp <socketcan@hartkopp.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
Cc: Moritz Muehlenhoff <jmm@debian.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
This commit is contained in:
parent
621eff477d
commit
8ece1d6711
@ -121,7 +121,7 @@ struct bcm_sock {
|
||||
struct list_head tx_ops;
|
||||
unsigned long dropped_usr_msgs;
|
||||
struct proc_dir_entry *bcm_proc_read;
|
||||
char procname [20]; /* pointer printed in ASCII with \0 */
|
||||
char procname [32]; /* inode number in decimal with \0 */
|
||||
};
|
||||
|
||||
static inline struct bcm_sock *bcm_sk(const struct sock *sk)
|
||||
@ -1479,7 +1479,7 @@ static int bcm_connect(struct socket *sock, struct sockaddr *uaddr, int len,
|
||||
|
||||
if (proc_dir) {
|
||||
/* unique socket address as filename */
|
||||
sprintf(bo->procname, "%p", sock);
|
||||
sprintf(bo->procname, "%lu", sock_i_ino(sk));
|
||||
bo->bcm_proc_read = create_proc_read_entry(bo->procname, 0644,
|
||||
proc_dir,
|
||||
bcm_read_proc, sk);
|
||||
|
Loading…
Reference in New Issue
Block a user