The patch titled fs/select.c: fix information leak to userspace has been removed from the -mm tree. Its filename was fs-select-fix-information-leak-to-userspace.patch This patch was dropped because it was merged into mainline or a subsystem tree The current -mm tree may be found at http://userweb.kernel.org/~akpm/mmotm/ ------------------------------------------------------ Subject: fs/select.c: fix information leak to userspace From: Vasiliy Kulikov <segooon@xxxxxxxxx> On some architectures __kernel_suseconds_t is int. On these archs struct timeval has padding bytes at the end. This struct is copied to userspace with these padding bytes uninitialized. This leads to leaking of contents of kernel stack memory. This bug was added with v2.6.27-rc5-286-gb773ad4. [akpm@xxxxxxxxxxxxxxxxxxxx: avoid the memset on architectures which don't need it] Signed-off-by: Vasiliy Kulikov <segooon@xxxxxxxxx> Cc: Al Viro <viro@xxxxxxxxxxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- fs/select.c | 2 ++ 1 file changed, 2 insertions(+) diff -puN fs/select.c~fs-select-fix-information-leak-to-userspace fs/select.c --- a/fs/select.c~fs-select-fix-information-leak-to-userspace +++ a/fs/select.c @@ -306,6 +306,8 @@ static int poll_select_copy_remaining(st rts.tv_sec = rts.tv_nsec = 0; if (timeval) { + if (sizeof(rtv) > sizeof(rtv.tv_sec) + sizeof(rtv.tv_usec)) + memset(&rtv, 0, sizeof(rtv)); rtv.tv_sec = rts.tv_sec; rtv.tv_usec = rts.tv_nsec / NSEC_PER_USEC; _ Patches currently in -mm which might be from segooon@xxxxxxxxx are origin.patch linux-next.patch -- To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html