Description
In the Linux kernel, the following vulnerability has been resolved: staging: gpib: fix unset padding field copy back to userspace The introduction of a padding field in the gpib_board_info_ioctl is showing up as initialized data on the stack frame being copyied back to userspace in function board_info_ioctl. The simplest fix is to initialize the entire struct to zero to ensure all unassigned padding fields are zero'd before being copied back to userspace.
Product status
9dde4559e93955ccc47d588f7fd051684d55c4e7 before 19dedd4f70f5a6505e7c601ef7dd40542d1d9aa5
9dde4559e93955ccc47d588f7fd051684d55c4e7 before a739d3b13bff0dfa1aec679d08c7062131a2a425
6.13
Any version before 6.13
6.16.1
6.17
References
git.kernel.org/...c/19dedd4f70f5a6505e7c601ef7dd40542d1d9aa5
git.kernel.org/...c/a739d3b13bff0dfa1aec679d08c7062131a2a425