* [PATCH] tap: fix stack info leak in tap_ioctl() SIOCGIFHWADDR
@ 2026-05-20 7:57 Weiming Shi
2026-05-20 21:22 ` Willem de Bruijn
0 siblings, 1 reply; 3+ messages in thread
From: Weiming Shi @ 2026-05-20 7:57 UTC (permalink / raw)
To: netdev, linux-kernel
Cc: willemdebruijn.kernel, jasowang, andrew+netdev, davem, edumazet,
kuba, pabeni, cong.wang, stable, xmei5, Weiming Shi
In the SIOCGIFHWADDR path, tap_ioctl() copies 16 bytes of an
uninitialised on-stack struct sockaddr_storage to userspace via
ifr_hwaddr, but netif_get_mac_address() only writes sa_family and
dev->addr_len (6 for Ethernet) bytes, leaving sa_data[6..13] uninitialised.
Those 8 trailing bytes leak kernel stack contents; SIOCGIFHWADDR on a
macvtap chardev returns kernel .text and direct-map pointers, defeating
KASLR.
Initialise ss at declaration.
Fixes: 3b23a32a6321 ("net: fix dev_ifsioc_locked() race condition")
Reported-by: Xiang Mei <xmei5@asu.edu>
Assisted-by: Claude:claude-opus-4-7
Signed-off-by: Weiming Shi <bestswngs@gmail.com>
---
drivers/net/tap.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/net/tap.c b/drivers/net/tap.c
index b8240737dc51..e1522101b9e4 100644
--- a/drivers/net/tap.c
+++ b/drivers/net/tap.c
@@ -923,7 +923,7 @@ static long tap_ioctl(struct file *file, unsigned int cmd,
unsigned int __user *up = argp;
unsigned short u;
int __user *sp = argp;
- struct sockaddr_storage ss;
+ struct sockaddr_storage ss = {};
int s;
int ret;
--
2.43.0
^ permalink raw reply related [flat|nested] 3+ messages in thread
* Re: [PATCH] tap: fix stack info leak in tap_ioctl() SIOCGIFHWADDR
2026-05-20 7:57 [PATCH] tap: fix stack info leak in tap_ioctl() SIOCGIFHWADDR Weiming Shi
@ 2026-05-20 21:22 ` Willem de Bruijn
2026-05-20 21:30 ` Willem de Bruijn
0 siblings, 1 reply; 3+ messages in thread
From: Willem de Bruijn @ 2026-05-20 21:22 UTC (permalink / raw)
To: Weiming Shi, netdev, linux-kernel
Cc: willemdebruijn.kernel, jasowang, andrew+netdev, davem, edumazet,
kuba, pabeni, cong.wang, stable, xmei5, Weiming Shi
Weiming Shi wrote:
> In the SIOCGIFHWADDR path, tap_ioctl() copies 16 bytes of an
> uninitialised on-stack struct sockaddr_storage to userspace via
> ifr_hwaddr, but netif_get_mac_address() only writes sa_family and
> dev->addr_len (6 for Ethernet) bytes, leaving sa_data[6..13] uninitialised.
>
> Those 8 trailing bytes leak kernel stack contents; SIOCGIFHWADDR on a
> macvtap chardev returns kernel .text and direct-map pointers, defeating
> KASLR.
>
> Initialise ss at declaration.
>
> Fixes: 3b23a32a6321 ("net: fix dev_ifsioc_locked() race condition")
> Reported-by: Xiang Mei <xmei5@asu.edu>
> Assisted-by: Claude:claude-opus-4-7
> Signed-off-by: Weiming Shi <bestswngs@gmail.com>
Reviewed-by: Willem de Bruijn <willemb@google.com>
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [PATCH] tap: fix stack info leak in tap_ioctl() SIOCGIFHWADDR
2026-05-20 21:22 ` Willem de Bruijn
@ 2026-05-20 21:30 ` Willem de Bruijn
0 siblings, 0 replies; 3+ messages in thread
From: Willem de Bruijn @ 2026-05-20 21:30 UTC (permalink / raw)
To: Willem de Bruijn, Weiming Shi, netdev, linux-kernel
Cc: willemdebruijn.kernel, jasowang, andrew+netdev, davem, edumazet,
kuba, pabeni, cong.wang, stable, xmei5, Weiming Shi
Willem de Bruijn wrote:
> Weiming Shi wrote:
> > In the SIOCGIFHWADDR path, tap_ioctl() copies 16 bytes of an
> > uninitialised on-stack struct sockaddr_storage to userspace via
> > ifr_hwaddr, but netif_get_mac_address() only writes sa_family and
> > dev->addr_len (6 for Ethernet) bytes, leaving sa_data[6..13] uninitialised.
> >
> > Those 8 trailing bytes leak kernel stack contents; SIOCGIFHWADDR on a
> > macvtap chardev returns kernel .text and direct-map pointers, defeating
> > KASLR.
> >
> > Initialise ss at declaration.
> >
> > Fixes: 3b23a32a6321 ("net: fix dev_ifsioc_locked() race condition")
> > Reported-by: Xiang Mei <xmei5@asu.edu>
> > Assisted-by: Claude:claude-opus-4-7
> > Signed-off-by: Weiming Shi <bestswngs@gmail.com>
>
> Reviewed-by: Willem de Bruijn <willemb@google.com>
But it should target [PATCH net] and
Cc: Stable@vger.kernel.org
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2026-05-20 21:30 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-05-20 7:57 [PATCH] tap: fix stack info leak in tap_ioctl() SIOCGIFHWADDR Weiming Shi
2026-05-20 21:22 ` Willem de Bruijn
2026-05-20 21:30 ` Willem de Bruijn
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox