[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20090211.134544.171113049.davem@davemloft.net>
Date: Wed, 11 Feb 2009 13:45:44 -0800 (PST)
From: David Miller <davem@...emloft.net>
To: clement.lecigne@...asq.com
Cc: linux-kernel@...r.kernel.org, netdev@...r.kernel.org
Subject: Re: [PATCH] 4 bytes kernel memory disclosure in SO_BSDCOMPAT gsopt
From: Clément LECIGNE <clement.lecigne@...asq.com>
Date: Wed, 11 Feb 2009 15:56:56 +0100
> Hello lkml,
>
> In function sock_getsockopt() located in net/core/sock.c, optval v.val is not correctly initialized and directly returned in userland in case we have SO_BSDCOMPAT option set.
>
> This dummy code should trigger the bug:
Some problems with your patch:
1) Your patch doesn't apply properly. It has been corrupted.
Somehow, even though you used an attachment, tab characters were
transformed into spaces.
2) Networking patches should be sent with at least
netdev@...r.kernel.org CC:'d so that your patch gets
properly traced at http://patchwork.ozlabs.org/project/netdev/list/
3) You need to provide a proper "Signed-off-by:" line with your
patch description. See linux/Documentation/SubmittingPatches
for details.
Please fix these issues up and resubmit your patch.
Thank you.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists