From: Oliver Hartkopp <socket...@hartkopp.net> Initialize the sockaddr_can structure to prevent a data leak to user space.
Suggested-by: Cong Wang <xiyou.wangc...@gmail.com> Reported-by: syzbot+057884e2f453e8afe...@syzkaller.appspotmail.com Fixes: e057dd3fc20f ("can: add ISO 15765-2:2016 transport protocol") Signed-off-by: Oliver Hartkopp <socket...@hartkopp.net> Link: https://lore.kernel.org/r/20210112091643.11789-1-socket...@hartkopp.net Signed-off-by: Marc Kleine-Budde <m...@pengutronix.de> --- net/can/isotp.c | 1 + 1 file changed, 1 insertion(+) diff --git a/net/can/isotp.c b/net/can/isotp.c index 7839c3b9e5be..3ef7f78e553b 100644 --- a/net/can/isotp.c +++ b/net/can/isotp.c @@ -1155,6 +1155,7 @@ static int isotp_getname(struct socket *sock, struct sockaddr *uaddr, int peer) if (peer) return -EOPNOTSUPP; + memset(addr, 0, sizeof(*addr)); addr->can_family = AF_CAN; addr->can_ifindex = so->ifindex; addr->can_addr.tp.rx_id = so->rxid; base-commit: a95d25dd7b94a5ba18246da09b4218f132fed60e -- 2.29.2