Description
In the Linux kernel, the following vulnerability has been resolved: xfrm: Zero padding when dumping algos and encap When copying data to user-space we should ensure that only valid data is copied over. Padding in structures may be filled with random (possibly sensitve) data and should never be given directly to user-space. This patch fixes the copying of xfrm algorithms and the encap template in xfrm_user so that padding is zeroed.
Product status
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 0725daaa9a879388ed312110f62dbd5ea2d75f8f
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 5218af4ad5d8948faac19f71583bcd786c3852df
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 1a351e26cc010d6991fbbd5701ac16581372e26f
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 8222d5910dae08213b6d9d4bc9a7f8502855e624
5.15.106
6.1.23
6.2.10
6.3
References
git.kernel.org/...c/0725daaa9a879388ed312110f62dbd5ea2d75f8f
git.kernel.org/...c/5218af4ad5d8948faac19f71583bcd786c3852df
git.kernel.org/...c/1a351e26cc010d6991fbbd5701ac16581372e26f
git.kernel.org/...c/8222d5910dae08213b6d9d4bc9a7f8502855e624