diff options
author | Tommi Rantala <tt.rantala@gmail.com> | 2012-11-27 04:01:46 +0000 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2012-11-28 11:10:09 -0500 |
commit | be364c8c0f17a3dd42707b5a090b318028538eb9 (patch) | |
tree | 9dc717f011a3b13666920cb0df741d6c6667ad28 /net/sctp/socket.c | |
parent | b49d3c1e1c948d76d64790abe9acffa9fa747d19 (diff) | |
download | op-kernel-dev-be364c8c0f17a3dd42707b5a090b318028538eb9.zip op-kernel-dev-be364c8c0f17a3dd42707b5a090b318028538eb9.tar.gz |
sctp: fix memory leak in sctp_datamsg_from_user() when copy from user space fails
Trinity (the syscall fuzzer) discovered a memory leak in SCTP,
reproducible e.g. with the sendto() syscall by passing invalid
user space pointer in the second argument:
#include <string.h>
#include <arpa/inet.h>
#include <sys/socket.h>
int main(void)
{
int fd;
struct sockaddr_in sa;
fd = socket(AF_INET, SOCK_STREAM, 132 /*IPPROTO_SCTP*/);
if (fd < 0)
return 1;
memset(&sa, 0, sizeof(sa));
sa.sin_family = AF_INET;
sa.sin_addr.s_addr = inet_addr("127.0.0.1");
sa.sin_port = htons(11111);
sendto(fd, NULL, 1, 0, (struct sockaddr *)&sa, sizeof(sa));
return 0;
}
As far as I can tell, the leak has been around since ~2003.
Signed-off-by: Tommi Rantala <tt.rantala@gmail.com>
Acked-by: Vlad Yasevich <vyasevich@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/sctp/socket.c')
0 files changed, 0 insertions, 0 deletions