Skip to content
Browse files

Bluetooth: HCI - Fix info leak via getsockname()

The HCI code fails to initialize the hci_channel member of struct
sockaddr_hci and that for leaks two bytes kernel stack via the
getsockname() syscall. Initialize hci_channel with 0 to avoid the
info leak.

Signed-off-by: Mathias Krause <>
Cc: Marcel Holtmann <>
Cc: Gustavo Padovan <>
Cc: Johan Hedberg <>
Signed-off-by: David S. Miller <>
  • Loading branch information...
1 parent e15ca9a commit 3f68ba07b1da811bf383b4b701b129bfcb2e4988 @minipli minipli committed with davem330 Aug 15, 2012
Showing with 1 addition and 0 deletions.
  1. +1 −0 net/bluetooth/hci_sock.c
1 net/bluetooth/hci_sock.c
@@ -694,6 +694,7 @@ static int hci_sock_getname(struct socket *sock, struct sockaddr *addr,
*addr_len = sizeof(*haddr);
haddr->hci_family = AF_BLUETOOTH;
haddr->hci_dev = hdev->id;
+ haddr->hci_channel= 0;
return 0;

0 comments on commit 3f68ba0

Please sign in to comment.
Something went wrong with that request. Please try again.