diff options
author | Eric Dumazet <eric.dumazet@gmail.com> | 2011-06-17 16:25:39 -0400 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@suse.de> | 2011-07-13 05:29:26 +0200 |
commit | ea573723636c6e7ede7cc876046a7027a02bcf2c (patch) | |
tree | b29c6b9c8c448736592e6e454d9d86e7b827ae28 /kernel | |
parent | d91b1971d6f5f72e638123f30684332473c5e07a (diff) |
inet_diag: fix inet_diag_bc_audit()
[ Upstream commit eeb1497277d6b1a0a34ed36b97e18f2bd7d6de0d ]
A malicious user or buggy application can inject code and trigger an
infinite loop in inet_diag_bc_audit()
Also make sure each instruction is aligned on 4 bytes boundary, to avoid
unaligned accesses.
Reported-by: Dan Rosenberg <drosenberg@vsecurity.com>
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Diffstat (limited to 'kernel')
0 files changed, 0 insertions, 0 deletions