Blame SOURCES/0003-xtables-restore-Avoid-access-of-uninitialized-data.patch

621646
From 5ee8338b9f1b5c02efca1a33185cf648cdf1aa20 Mon Sep 17 00:00:00 2001
621646
From: Phil Sutter <phil@nwl.cc>
621646
Date: Thu, 5 Dec 2019 11:40:26 +0100
621646
Subject: [PATCH] xtables-restore: Avoid access of uninitialized data
621646
621646
When flushing, 'buffer' is not written to prior to checking its first
621646
byte's value. Therefore it needs to be initialized upon declaration.
621646
621646
Fixes: 09cb517949e69 ("xtables-restore: Improve performance of --noflush operation")
621646
(cherry picked from commit 48be21bf39f9af35d53af0e211cbd50dcfd12d08)
621646
Signed-off-by: Phil Sutter <psutter@redhat.com>
621646
---
621646
 iptables/xtables-restore.c | 2 +-
621646
 1 file changed, 1 insertion(+), 1 deletion(-)
621646
621646
diff --git a/iptables/xtables-restore.c b/iptables/xtables-restore.c
621646
index dd907e0b8ddd5..63cc15cee9621 100644
621646
--- a/iptables/xtables-restore.c
621646
+++ b/iptables/xtables-restore.c
621646
@@ -281,7 +281,7 @@ void xtables_restore_parse(struct nft_handle *h,
621646
 			   const struct nft_xt_restore_parse *p)
621646
 {
621646
 	struct nft_xt_restore_state state = {};
621646
-	char preload_buffer[PREBUFSIZ] = {}, buffer[10240], *ptr;
621646
+	char preload_buffer[PREBUFSIZ] = {}, buffer[10240] = {}, *ptr;
621646
 
621646
 	if (!h->noflush) {
621646
 		nft_fake_cache(h);
621646
-- 
621646
2.24.0
621646