From: Mathias Krause Date: Wed, 15 Aug 2012 11:31:47 +0000 (+0000) Subject: Bluetooth: HCI - Fix info leak via getsockname() X-Git-Tag: v3.6-rc3~10^2~34 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=3f68ba07b1da811bf383b4b701b129bfcb2e4988;p=platform%2Fkernel%2Flinux-exynos.git Bluetooth: HCI - Fix info leak via getsockname() The HCI code fails to initialize the hci_channel member of struct sockaddr_hci and that for leaks two bytes kernel stack via the getsockname() syscall. Initialize hci_channel with 0 to avoid the info leak. Signed-off-by: Mathias Krause Cc: Marcel Holtmann Cc: Gustavo Padovan Cc: Johan Hedberg Signed-off-by: David S. Miller --- diff --git a/net/bluetooth/hci_sock.c b/net/bluetooth/hci_sock.c index a27bbc3..19fdac7 100644 --- a/net/bluetooth/hci_sock.c +++ b/net/bluetooth/hci_sock.c @@ -694,6 +694,7 @@ static int hci_sock_getname(struct socket *sock, struct sockaddr *addr, *addr_len = sizeof(*haddr); haddr->hci_family = AF_BLUETOOTH; haddr->hci_dev = hdev->id; + haddr->hci_channel= 0; release_sock(sk); return 0;