aboutsummaryrefslogtreecommitdiffstats
path: root/net/dccp
diff options
context:
space:
mode:
authorMathias Krause <minipli@googlemail.com>2012-08-15 11:31:53 +0000
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2012-10-02 09:47:21 -0700
commit27fb5ec5224d73f8e05a0ec6a00bf6b07a591470 (patch)
tree234f3a45a150d56450185b6e466399e37c93a0be /net/dccp
parent6ffb80e739e282d7b9ffa43c2ec2a9766c8099a1 (diff)
downloadkernel_samsung_smdk4412-27fb5ec5224d73f8e05a0ec6a00bf6b07a591470.zip
kernel_samsung_smdk4412-27fb5ec5224d73f8e05a0ec6a00bf6b07a591470.tar.gz
kernel_samsung_smdk4412-27fb5ec5224d73f8e05a0ec6a00bf6b07a591470.tar.bz2
llc: fix info leak via getsockname()
[ Upstream commit 3592aaeb80290bda0f2cf0b5456c97bfc638b192 ] The LLC code wrongly returns 0, i.e. "success", when the socket is zapped. Together with the uninitialized uaddrlen pointer argument from sys_getsockname this leads to an arbitrary memory leak of up to 128 bytes kernel stack via the getsockname() syscall. Return an error instead when the socket is zapped to prevent the info leak. Also remove the unnecessary memset(0). We don't directly write to the memory pointed by uaddr but memcpy() a local structure at the end of the function that is properly initialized. Signed-off-by: Mathias Krause <minipli@googlemail.com> Cc: Arnaldo Carvalho de Melo <acme@ghostprotocols.net> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'net/dccp')
0 files changed, 0 insertions, 0 deletions