diff options
author | Michael Buesch <mb@bu3sch.de> | 2008-01-23 21:44:15 +0100 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2008-01-31 19:26:45 -0800 |
commit | 09552ccd8277e6382097e93a40f7311a09449367 (patch) | |
tree | c6e9b3f46ab04a0f1a461699d01cd6dbaa71e9bb /net/rfkill | |
parent | 7be1bb6b798d506693d2d8668e801951996b5a4a (diff) | |
download | linux-09552ccd8277e6382097e93a40f7311a09449367.tar.gz linux-09552ccd8277e6382097e93a40f7311a09449367.tar.bz2 linux-09552ccd8277e6382097e93a40f7311a09449367.zip |
b43: Drop packets that we are not able to encrypt
We must not transmit packets we're not able to encrypt.
This fixes a bug where in a tiny timeframe after machine resume
packets can get sent unencrypted and might leak information.
This also fixes three small resource leakages I spotted while fixing
the security problem. Properly deallocate the DMA slots in any DMA
allocation error path.
Signed-off-by: Michael Buesch <mb@bu3sch.de>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/rfkill')
0 files changed, 0 insertions, 0 deletions