Re: [PATCH] 4 bytes kernel memory disclosure in SO_BSDCOMPAT gsopt

From: David Miller
Date: Wed Feb 11 2009 - 16:46:06 EST


From: Clément LECIGNE <clement.lecigne@xxxxxxxxxx>
Date: Wed, 11 Feb 2009 15:56:56 +0100

> Hello lkml,
>
> In function sock_getsockopt() located in net/core/sock.c, optval v.val is not correctly initialized and directly returned in userland in case we have SO_BSDCOMPAT option set.
>
> This dummy code should trigger the bug:

Some problems with your patch:

1) Your patch doesn't apply properly. It has been corrupted.

Somehow, even though you used an attachment, tab characters were
transformed into spaces.

2) Networking patches should be sent with at least
netdev@xxxxxxxxxxxxxxx CC:'d so that your patch gets
properly traced at http://patchwork.ozlabs.org/project/netdev/list/

3) You need to provide a proper "Signed-off-by:" line with your
patch description. See linux/Documentation/SubmittingPatches
for details.

Please fix these issues up and resubmit your patch.

Thank you.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/