aboutsummaryrefslogtreecommitdiff
path: root/net/sched/em_nbyte.c
diff options
context:
space:
mode:
authorTommi Rantala <tt.rantala@gmail.com>2012-11-27 04:01:46 +0000
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2012-12-17 09:27:20 -0800
commit11b435b090b40a36d3cf1eb45de8eceb012af93f (patch)
tree4b38f78e87ec39a7b0382a9571bc2572dabab710 /net/sched/em_nbyte.c
parentc60fcb1a18086c3050ff05c49f16ce4bf6d11421 (diff)
sctp: fix memory leak in sctp_datamsg_from_user() when copy from user space fails
[ Upstream commit be364c8c0f17a3dd42707b5a090b318028538eb9 ] Trinity (the syscall fuzzer) discovered a memory leak in SCTP, reproducible e.g. with the sendto() syscall by passing invalid user space pointer in the second argument: #include <string.h> #include <arpa/inet.h> #include <sys/socket.h> int main(void) { int fd; struct sockaddr_in sa; fd = socket(AF_INET, SOCK_STREAM, 132 /*IPPROTO_SCTP*/); if (fd < 0) return 1; memset(&sa, 0, sizeof(sa)); sa.sin_family = AF_INET; sa.sin_addr.s_addr = inet_addr("127.0.0.1"); sa.sin_port = htons(11111); sendto(fd, NULL, 1, 0, (struct sockaddr *)&sa, sizeof(sa)); return 0; } As far as I can tell, the leak has been around since ~2003. Signed-off-by: Tommi Rantala <tt.rantala@gmail.com> Acked-by: Vlad Yasevich <vyasevich@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'net/sched/em_nbyte.c')
0 files changed, 0 insertions, 0 deletions