alistair23-linux/net/ieee802154
Hannes Frederic Sowa bceaa90240 inet: prevent leakage of uninitialized memory to user in recv syscalls
Only update *addr_len when we actually fill in sockaddr, otherwise we
can return uninitialized memory from the stack to the caller in the
recvfrom, recvmmsg and recvmsg syscalls. Drop the the (addr_len == NULL)
checks because we only get called with a valid addr_len pointer either
from sock_common_recvmsg or inet_recvmsg.

If a blocking read waits on a socket which is concurrently shut down we
now return zero and set msg_msgnamelen to 0.

Reported-by: mpb <mpb.mail@gmail.com>
Suggested-by: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-11-18 15:12:03 -05:00
..
6lowpan.c 6lowpan: Uncompression of traffic class field was incorrect 2013-11-15 03:11:06 -05:00
6lowpan.h 6lowpan: lowpan_uncompress_addr with address_mode 2013-08-20 13:23:12 -07:00
af802154.h
af_ieee802154.c
dgram.c inet: prevent leakage of uninitialized memory to user in recv syscalls 2013-11-18 15:12:03 -05:00
ieee802154.h ieee802154: use genl_register_family_with_ops() 2013-11-14 17:10:40 -05:00
Kconfig
Makefile
netlink.c genetlink: make all genl_ops users const 2013-11-14 17:10:41 -05:00
nl-mac.c ieee802154: use genl_register_family_with_ops() 2013-11-14 17:10:40 -05:00
nl-phy.c ieee802154: use genl_register_family_with_ops() 2013-11-14 17:10:40 -05:00
nl_policy.c
raw.c
wpan-class.c net: ieee802154: convert class code to use dev_groups 2013-07-26 18:05:18 -07:00