summaryrefslogtreecommitdiffstats
path: root/net/rfkill
diff options
context:
space:
mode:
authorMichael Buesch <mb@bu3sch.de>2008-01-23 21:44:15 +0100
committerDavid S. Miller <davem@davemloft.net>2008-01-31 19:26:45 -0800
commit09552ccd8277e6382097e93a40f7311a09449367 (patch)
treec6e9b3f46ab04a0f1a461699d01cd6dbaa71e9bb /net/rfkill
parent7be1bb6b798d506693d2d8668e801951996b5a4a (diff)
downloadlinux-09552ccd8277e6382097e93a40f7311a09449367.tar.gz
linux-09552ccd8277e6382097e93a40f7311a09449367.tar.bz2
linux-09552ccd8277e6382097e93a40f7311a09449367.zip
b43: Drop packets that we are not able to encrypt
We must not transmit packets we're not able to encrypt. This fixes a bug where in a tiny timeframe after machine resume packets can get sent unencrypted and might leak information. This also fixes three small resource leakages I spotted while fixing the security problem. Properly deallocate the DMA slots in any DMA allocation error path. Signed-off-by: Michael Buesch <mb@bu3sch.de> Signed-off-by: John W. Linville <linville@tuxdriver.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/rfkill')
0 files changed, 0 insertions, 0 deletions