aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authordongha7.kang <dongha7.kang@samsung.com>2016-07-13 17:38:33 +0900
committerdongha7.kang <dongha7.kang@samsung.com>2016-07-13 17:38:33 +0900
commitd550156beffdf4134760b689c291a56986993042 (patch)
tree42c31b4652d957b9397c5884000f5a4c3eeeb9a3
parent7e3d331f8972bf7938e954937d26c2ac573c7372 (diff)
sprat: netfilter: Add security patch (CVE-2016-3809)android-wear-6.0.1_r0.57
Information Disclosure Vulnerability in Networking Component (Device Specific) An information disclosure vulnerability in the networking component could enable a local malicious application to access data outside of its permission levels. This issue is rated as High because it could be used to access sensitive data without explicit user permission. Kernel pointers are printed to all users. The fix is designed to not print kernel pointers to any user. Change-Id: Ifde9a2dd0763950ea36acf7807c104ce3b0bbaa7 Signed-off-by: dongha7.kang <dongha7.kang@samsung.com>
-rw-r--r--net/netfilter/xt_qtaguid.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/net/netfilter/xt_qtaguid.c b/net/netfilter/xt_qtaguid.c
index 58416233287c..dbac5a5d3ad4 100644
--- a/net/netfilter/xt_qtaguid.c
+++ b/net/netfilter/xt_qtaguid.c
@@ -1940,7 +1940,7 @@ static int qtaguid_ctrl_proc_show(struct seq_file *m, void *v)
);
f_count = atomic_long_read(
&sock_tag_entry->socket->file->f_count);
- seq_printf(m, "sock=%p tag=0x%llx (uid=%u) pid=%u "
+ seq_printf(m, "sock=%pK tag=0x%llx (uid=%u) pid=%u "
"f_count=%lu\n",
sock_tag_entry->sk,
sock_tag_entry->tag, uid,