Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 3 Jun 2016 15:26:24 +0200
From: Kangjie Lu <>
Cc: Taesoo Kim <>, Chengyu Song <>
Subject: CVE Request: tipc: an infoleak in tipc_nl_compat_link_dump


In function tipc_nl_compat_link_dump of file net/tipc/netlink_compat.c,
link_info.str is a char array of size 60. Memory after the NULL
byte is not initialized. Sending the whole object out can cause
a leak of sensitive info in kernel stack.

Fix info:

Please help assign a CVE to this vulnerability.

Kangjie Lu

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ