inet_diag: fix inet_diag_bc_audit()
commitea573723636c6e7ede7cc876046a7027a02bcf2c
authorEric Dumazet <eric.dumazet@gmail.com>
Fri, 17 Jun 2011 20:25:39 +0000 (17 16:25 -0400)
committerGreg Kroah-Hartman <gregkh@suse.de>
Wed, 13 Jul 2011 03:29:26 +0000 (13 05:29 +0200)
treeb29c6b9c8c448736592e6e454d9d86e7b827ae28
parentd91b1971d6f5f72e638123f30684332473c5e07a
inet_diag: fix inet_diag_bc_audit()

[ Upstream commit eeb1497277d6b1a0a34ed36b97e18f2bd7d6de0d ]

A malicious user or buggy application can inject code and trigger an
infinite loop in inet_diag_bc_audit()

Also make sure each instruction is aligned on 4 bytes boundary, to avoid
unaligned accesses.

Reported-by: Dan Rosenberg <drosenberg@vsecurity.com>
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
net/ipv4/inet_diag.c