All of lore.kernel.org
 help / color / mirror / Atom feed
* [patch] wan/x25_asy: integer overflow in x25_asy_change_mtu()
@ 2014-07-17  8:03 ` Dan Carpenter
  0 siblings, 0 replies; 11+ messages in thread
From: Dan Carpenter @ 2014-07-17  8:03 UTC (permalink / raw)
  To: netdev; +Cc: kernel-janitors

If "newmtu * 2 + 4" is too large then it can cause an integer overflow
leading to memory corruption.  Btw, "newmtu" is not allowed to be a
negative number because of the check in dev_set_mtu(), so that's ok.

Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>

diff --git a/drivers/net/wan/x25_asy.c b/drivers/net/wan/x25_asy.c
index 5895f19..f04c8c1 100644
--- a/drivers/net/wan/x25_asy.c
+++ b/drivers/net/wan/x25_asy.c
@@ -122,8 +122,11 @@ static int x25_asy_change_mtu(struct net_device *dev, int newmtu)
 {
 	struct x25_asy *sl = netdev_priv(dev);
 	unsigned char *xbuff, *rbuff;
-	int len = 2 * newmtu;
+	int len;
 
+	if (newmtu > INT_MAX / 2 - 4)
+		return -EINVAL;
+	len = 2 * newmtu;
 	xbuff = kmalloc(len + 4, GFP_ATOMIC);
 	rbuff = kmalloc(len + 4, GFP_ATOMIC);
 

^ permalink raw reply related	[flat|nested] 11+ messages in thread

end of thread, other threads:[~2014-07-17 23:48 UTC | newest]

Thread overview: 11+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-07-17  8:03 [patch] wan/x25_asy: integer overflow in x25_asy_change_mtu() Dan Carpenter
2014-07-17  8:03 ` Dan Carpenter
2014-07-17  8:45 ` David Laight
2014-07-17  8:58   ` Dan Carpenter
2014-07-17  8:58     ` Dan Carpenter
2014-07-17  9:14     ` Eric Dumazet
2014-07-17  9:14       ` Eric Dumazet
2014-07-17 10:50       ` [patch v2] " Dan Carpenter
2014-07-17 10:50         ` Dan Carpenter
2014-07-17 23:48         ` David Miller
2014-07-17 23:48           ` David Miller

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.