fs: prevent integer overflow in zfs_nvlist_lookup
An integer overflow in nvlist size calculation could lead to under-allocation and heap buffer overflow. Signed-off-by: Timo tp Preißl <t.preissl@proton.me> Reviewed-by: Simon Glass <simon.glass@canonical.com> Reviewed-by: Tom Rini <trini@konsulko.com>
This commit is contained in:
@@ -1617,6 +1617,7 @@ zfs_nvlist_lookup_nvlist(char *nvlist, char *name)
|
||||
char *ret;
|
||||
size_t size;
|
||||
int found;
|
||||
size_t alloc;
|
||||
|
||||
found = nvlist_find_value(nvlist, name, DATA_TYPE_NVLIST, &nvpair,
|
||||
&size, 0);
|
||||
@@ -1627,7 +1628,10 @@ zfs_nvlist_lookup_nvlist(char *nvlist, char *name)
|
||||
* nvlist to hold the encoding method, and two zero uint32's after the
|
||||
* nvlist as the NULL terminator.
|
||||
*/
|
||||
ret = calloc(1, size + 3 * sizeof(uint32_t));
|
||||
if (__builtin_add_overflow(size, 3 * sizeof(uint32_t), &alloc))
|
||||
return 0;
|
||||
|
||||
ret = calloc(1, alloc);
|
||||
if (!ret)
|
||||
return 0;
|
||||
memcpy(ret, nvlist, sizeof(uint32_t));
|
||||
|
||||
Reference in New Issue
Block a user