diff options
author | dongha7.kang <dongha7.kang@samsung.com> | 2016-07-13 17:38:33 +0900 |
---|---|---|
committer | dongha7.kang <dongha7.kang@samsung.com> | 2016-07-13 17:38:33 +0900 |
commit | d550156beffdf4134760b689c291a56986993042 (patch) | |
tree | 42c31b4652d957b9397c5884000f5a4c3eeeb9a3 | |
parent | 7e3d331f8972bf7938e954937d26c2ac573c7372 (diff) |
sprat: netfilter: Add security patch (CVE-2016-3809)android-wear-6.0.1_r0.57
Information Disclosure Vulnerability in Networking Component (Device Specific)
An information disclosure vulnerability in the networking component could enable a local malicious application to access data outside of its permission levels.
This issue is rated as High because it could be used to access sensitive data without explicit user permission.
Kernel pointers are printed to all users.
The fix is designed to not print kernel pointers to any user.
Change-Id: Ifde9a2dd0763950ea36acf7807c104ce3b0bbaa7
Signed-off-by: dongha7.kang <dongha7.kang@samsung.com>
-rw-r--r-- | net/netfilter/xt_qtaguid.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/netfilter/xt_qtaguid.c b/net/netfilter/xt_qtaguid.c index 58416233287c..dbac5a5d3ad4 100644 --- a/net/netfilter/xt_qtaguid.c +++ b/net/netfilter/xt_qtaguid.c @@ -1940,7 +1940,7 @@ static int qtaguid_ctrl_proc_show(struct seq_file *m, void *v) ); f_count = atomic_long_read( &sock_tag_entry->socket->file->f_count); - seq_printf(m, "sock=%p tag=0x%llx (uid=%u) pid=%u " + seq_printf(m, "sock=%pK tag=0x%llx (uid=%u) pid=%u " "f_count=%lu\n", sock_tag_entry->sk, sock_tag_entry->tag, uid, |