linux/net/irda
Colin Ian King b024d949a3 irda: do not leak initialized list.dev to userspace
list.dev has not been initialized and so the copy_to_user is copying
data from the stack back to user space which is a potential
information leak. Fix this ensuring all of list is initialized to
zero.

Detected by CoverityScan, CID#1357894 ("Uninitialized scalar variable")

Signed-off-by: Colin Ian King <colin.king@canonical.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-08-18 16:21:51 -07:00
..
ircomm Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next 2017-07-05 12:31:59 -07:00
irlan net: Fix inconsistent teardown and release of private netdev state. 2017-06-07 15:53:24 -04:00
irnet networking: make skb_push & __skb_push return void pointers 2017-06-16 11:48:40 -04:00
Kconfig
Makefile
af_irda.c irda: do not leak initialized list.dev to userspace 2017-08-18 16:21:51 -07:00
discovery.c
irda_device.c Replace <asm/uaccess.h> with <linux/uaccess.h> globally 2016-12-24 11:46:01 -08:00
iriap.c
iriap_event.c
irias_object.c
irlap.c
irlap_event.c
irlap_frame.c net: manual clean code which call skb_put_[data:zero] 2017-06-20 13:30:15 -04:00
irlmp.c
irlmp_event.c
irlmp_frame.c
irmod.c
irnetlink.c genetlink: mark families as __ro_after_init 2016-10-27 16:16:09 -04:00
irproc.c irda: irproc.c: Remove unneeded linux/miscdevice.h include 2016-12-17 11:16:31 -05:00
irqueue.c irda: Fix lockdep annotations in hashbin_delete(). 2017-02-17 16:19:39 -05:00
irsysctl.c
irttp.c
parameters.c
qos.c
timer.c
wrapper.c