netfilter: ipset: small potential read beyond the end of buffer
authorDan Carpenter <dan.carpenter@oracle.com>
Mon, 10 Nov 2014 16:11:21 +0000 (17:11 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Tue, 27 Jan 2015 15:52:33 +0000 (07:52 -0800)
commitfcdba992c29bd54f94a90d531d6d48a45ef23b9f
treefecb9f065ac91c90ffdc7498c281821e77a8183d
parent34a322c73ac589947e5daf84375da23e1babd657
netfilter: ipset: small potential read beyond the end of buffer

commit 2196937e12b1b4ba139806d132647e1651d655df upstream.

We could be reading 8 bytes into a 4 byte buffer here.  It seems
harmless but adding a check is the right thing to do and it silences a
static checker warning.

Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Acked-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
net/netfilter/ipset/ip_set_core.c