lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 01 Oct 2007 16:36:26 +0200 From: Patrick McHardy <kaber@...sh.net> To: "Denis V. Lunev" <den@...nvz.org> CC: davem@...emloft.net, netdev@...r.kernel.org Subject: Re: [PATCH] memory leak in netlink user->kernel processing Denis V. Lunev wrote: > netlink_kernel_create can be called with NULL as an input callback in several > places, f.e. in kobject_uevent_init. This means that if one sends packet from > user to kernel for such a socket, the packet will be leaked in the socket > queue forever. > > This patch adds a simple generic cleanup callback for these sockets. This should already be handled by netlink_getsockbypid: /* Don't bother queuing skb if kernel socket has no input function */ nlk = nlk_sk(sock); if ((nlk->pid == 0 && !nlk->data_ready) || (sock->sk_state == NETLINK_CONNECTED && nlk->dst_pid != nlk_sk(ssk)->pid)) { sock_put(sock); return ERR_PTR(-ECONNREFUSED); } - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists