summaryrefslogtreecommitdiff
path: root/net/sctp/socket.c
diff options
context:
space:
mode:
authorTommi Rantala <tt.rantala@gmail.com>2012-11-27 08:01:46 +0400
committerDavid S. Miller <davem@davemloft.net>2012-11-28 20:10:09 +0400
commitbe364c8c0f17a3dd42707b5a090b318028538eb9 (patch)
tree9dc717f011a3b13666920cb0df741d6c6667ad28 /net/sctp/socket.c
parentb49d3c1e1c948d76d64790abe9acffa9fa747d19 (diff)
downloadlinux-be364c8c0f17a3dd42707b5a090b318028538eb9.tar.xz
sctp: fix memory leak in sctp_datamsg_from_user() when copy from user space fails
Trinity (the syscall fuzzer) discovered a memory leak in SCTP, reproducible e.g. with the sendto() syscall by passing invalid user space pointer in the second argument: #include <string.h> #include <arpa/inet.h> #include <sys/socket.h> int main(void) { int fd; struct sockaddr_in sa; fd = socket(AF_INET, SOCK_STREAM, 132 /*IPPROTO_SCTP*/); if (fd < 0) return 1; memset(&sa, 0, sizeof(sa)); sa.sin_family = AF_INET; sa.sin_addr.s_addr = inet_addr("127.0.0.1"); sa.sin_port = htons(11111); sendto(fd, NULL, 1, 0, (struct sockaddr *)&sa, sizeof(sa)); return 0; } As far as I can tell, the leak has been around since ~2003. Signed-off-by: Tommi Rantala <tt.rantala@gmail.com> Acked-by: Vlad Yasevich <vyasevich@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/sctp/socket.c')
0 files changed, 0 insertions, 0 deletions