diff options
| author | Neil Horman <[email protected]> | 2019-06-13 10:35:59 +0000 |
|---|---|---|
| committer | David S. Miller <[email protected]> | 2019-06-15 02:27:24 +0000 |
| commit | ce950f1050cece5e406a5cde723c69bba60e1b26 (patch) | |
| tree | 8aecfaeb0ff4506107ead6fad531a4b30c31633b /net/ipv4/tcp_output.c | |
| parent | net: dsa: microchip: Don't try to read stats for unused ports (diff) | |
| download | kernel-ce950f1050cece5e406a5cde723c69bba60e1b26.tar.gz kernel-ce950f1050cece5e406a5cde723c69bba60e1b26.zip | |
sctp: Free cookie before we memdup a new one
Based on comments from Xin, even after fixes for our recent syzbot
report of cookie memory leaks, its possible to get a resend of an INIT
chunk which would lead to us leaking cookie memory.
To ensure that we don't leak cookie memory, free any previously
allocated cookie first.
Change notes
v1->v2
update subsystem tag in subject (davem)
repeat kfree check for peer_random and peer_hmacs (xin)
v2->v3
net->sctp
also free peer_chunks
v3->v4
fix subject tags
v4->v5
remove cut line
Signed-off-by: Neil Horman <[email protected]>
Reported-by: [email protected]
CC: Marcelo Ricardo Leitner <[email protected]>
CC: Xin Long <[email protected]>
CC: "David S. Miller" <[email protected]>
CC: [email protected]
Acked-by: Marcelo Ricardo Leitner <[email protected]>
Signed-off-by: David S. Miller <[email protected]>
Diffstat (limited to 'net/ipv4/tcp_output.c')
0 files changed, 0 insertions, 0 deletions
