inet_diag: fix inet_diag_bc_audit()
commit9d569ed9dda00472c3d9efaab9e34c193fafc555
authorEric Dumazet <eric.dumazet@gmail.com>
Fri, 17 Jun 2011 20:25:39 +0000 (17 16:25 -0400)
committerGreg Kroah-Hartman <gregkh@suse.de>
Sat, 9 Jul 2011 06:14:54 +0000 (8 23:14 -0700)
tree4cc27a68243c35b605f8b51f1f9222c1cf84dd51
parent99b10d9afa00889134c325c49aac684d8a9212b2
inet_diag: fix inet_diag_bc_audit()

[ Upstream commit eeb1497277d6b1a0a34ed36b97e18f2bd7d6de0d ]

A malicious user or buggy application can inject code and trigger an
infinite loop in inet_diag_bc_audit()

Also make sure each instruction is aligned on 4 bytes boundary, to avoid
unaligned accesses.

Reported-by: Dan Rosenberg <drosenberg@vsecurity.com>
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
net/ipv4/inet_diag.c