From 870aff99a279ed428c5a2560b2441b3079ddb34b Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Timo=20tp=20Prei=C3=9Fl?= Date: Fri, 9 Jan 2026 11:24:59 +0000 Subject: [PATCH] fs: prevent integer overflow in sqfs_concat MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit An integer overflow in length calculation could lead to under-allocation and buffer overcopy. Signed-off-by: Timo tp Preißl Reviewed-by: Tom Rini Reviewed-by: Simon Glass Reviewed-by: João Marcos Costa --- fs/squashfs/sqfs.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/fs/squashfs/sqfs.c b/fs/squashfs/sqfs.c index 4d3d83b7587..f668c26472e 100644 --- a/fs/squashfs/sqfs.c +++ b/fs/squashfs/sqfs.c @@ -255,10 +255,14 @@ static char *sqfs_concat_tokens(char **token_list, int token_count) { char *result; int i, length = 0, offset = 0; + size_t alloc; length = sqfs_get_tokens_length(token_list, token_count); - result = malloc(length + 1); + if (__builtin_add_overflow(length, 1, &alloc)) + return 0; + + result = malloc(alloc); if (!result) return NULL;