From mboxrd@z Thu Jan 1 00:00:00 1970 From: Dan Carpenter Date: Tue, 18 Jun 2013 07:46:03 +0000 Subject: [patch] netfilter: prevent harmless integer overflow Message-Id: <20130618074603.GF12329@elgon.mountain> List-Id: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: Bart De Schuymer Cc: coreteam@netfilter.org, netdev@vger.kernel.org, bridge@lists.linux-foundation.org, kernel-janitors@vger.kernel.org, "David S. Miller" , Stephen Hemminger , netfilter@vger.kernel.org, netfilter-devel@vger.kernel.org, Patrick McHardy , Pablo Neira Ayuso This overflow is harmless because a few lines later we check: if (num_counters != t->private->nentries) { But it still upsets the static checkers. Signed-off-by: Dan Carpenter diff --git a/net/bridge/netfilter/ebtables.c b/net/bridge/netfilter/ebtables.c index 3d110c4..141350e 100644 --- a/net/bridge/netfilter/ebtables.c +++ b/net/bridge/netfilter/ebtables.c @@ -1278,6 +1278,8 @@ static int do_update_counters(struct net *net, const char *name, if (num_counters = 0) return -EINVAL; + if (num_counters > INT_MAX / sizeof(*tmp)) + return -ENOMEM; tmp = vmalloc(num_counters * sizeof(*tmp)); if (!tmp)