]> git.hungrycats.org Git - linux/commit
inet_diag: fix inet_diag_bc_audit()
authorEric Dumazet <eric.dumazet@gmail.com>
Fri, 17 Jun 2011 20:25:39 +0000 (16:25 -0400)
committerPaul Gortmaker <paul.gortmaker@windriver.com>
Wed, 14 Mar 2012 14:58:02 +0000 (10:58 -0400)
commit48e5665af53af5a98a05b70e1d423971447a9d42
treee645fabb6cced1f402efa74b3491ac9ffb3c8500
parentc2a7739335a332cc6ed24013a6b40e245b31a718
inet_diag: fix inet_diag_bc_audit()

commit eeb1497277d6b1a0a34ed36b97e18f2bd7d6de0d upstream.

A malicious user or buggy application can inject code and trigger an
infinite loop in inet_diag_bc_audit()

Also make sure each instruction is aligned on 4 bytes boundary, to avoid
unaligned accesses.

Reported-by: Dan Rosenberg <drosenberg@vsecurity.com>
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
net/ipv4/inet_diag.c