mp2t (CID 1355406): fix a potential integer overflow
authorMartin Kaiser <wireshark@kaiser.cx>
Tue, 10 May 2016 21:06:57 +0000 (23:06 +0200)
committerMartin Kaiser <wireshark@kaiser.cx>
Sat, 14 May 2016 09:45:54 +0000 (09:45 +0000)
commit2f1e9561429775cc4fe713354e33d1cefff97dc4
tree438dd6637efa3cdb5d56912bf3f4f4ac991dfc7c
parenta7ba38a72e31287944d86338dcc5d29076c387ad
mp2t (CID 1355406): fix a potential integer overflow

cast one of the factors to uint64 to make sure that the calculation uses
uint64 and not uint32 which may overflow

Change-Id: Iec14f870a694008f5a734294d9154117b6c64b78
Reviewed-on: https://code.wireshark.org/review/15346
Petri-Dish: Jaap Keuter <jaap.keuter@xs4all.nl>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Martin Kaiser <wireshark@kaiser.cx>
wiretap/mp2t.c