ipv4: potential underflow in compat_ip_setsockopt()
authorDan Carpenter <dan.carpenter@oracle.com>
Sat, 23 May 2020 17:46:48 +0000 (20:46 +0300)
committerDavid S. Miller <davem@davemloft.net>
Tue, 26 May 2020 00:51:28 +0000 (17:51 -0700)
The value of "n" is capped at 0x1ffffff but it checked for negative
values.  I don't think this causes a problem but I'm not certain and
it's harmless to prevent it.

Fixes: 2e04172875c9 ("ipv4: do compat setsockopt for MCAST_MSFILTER directly")
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/ipv4/ip_sockglue.c

index a2469bc57cfe85c240541152568b5b84bb4ff757..f43d5f12aa86afce60707fd24a1209ec9846b560 100644 (file)
@@ -1347,8 +1347,8 @@ int compat_ip_setsockopt(struct sock *sk, int level, int optname,
        {
                const int size0 = offsetof(struct compat_group_filter, gf_slist);
                struct compat_group_filter *gf32;
+               unsigned int n;
                void *p;
-               int n;
 
                if (optlen < size0)
                        return -EINVAL;