From: Benjamin Berg Date: Mon, 25 Sep 2023 15:18:56 +0000 (+0200) Subject: wifi: cfg80211: avoid leaking stack data into trace X-Git-Tag: v4.14.328~14 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=aca85d86fbbb81e10afb79468e3143cb32bc7c7e;p=thirdparty%2Fkernel%2Fstable.git wifi: cfg80211: avoid leaking stack data into trace [ Upstream commit 334bf33eec5701a1e4e967bcb7cc8611a998334b ] If the structure is not initialized then boolean types might be copied into the tracing data without being initialised. This causes data from the stack to leak into the trace and also triggers a UBSAN failure which can easily be avoided here. Signed-off-by: Benjamin Berg Link: https://lore.kernel.org/r/20230925171855.a9271ef53b05.I8180bae663984c91a3e036b87f36a640ba409817@changeid Signed-off-by: Johannes Berg Signed-off-by: Sasha Levin --- diff --git a/net/wireless/nl80211.c b/net/wireless/nl80211.c index 7085c54e6e508..b4b564182db01 100644 --- a/net/wireless/nl80211.c +++ b/net/wireless/nl80211.c @@ -6159,7 +6159,7 @@ static int nl80211_update_mesh_config(struct sk_buff *skb, struct cfg80211_registered_device *rdev = info->user_ptr[0]; struct net_device *dev = info->user_ptr[1]; struct wireless_dev *wdev = dev->ieee80211_ptr; - struct mesh_config cfg; + struct mesh_config cfg = {}; u32 mask; int err;