diff options
author | Richard Weinberger <richard@nod.at> | 2024-08-09 11:54:28 +0200 |
---|---|---|
committer | Tom Rini <trini@konsulko.com> | 2024-08-15 16:14:36 -0600 |
commit | 35f75d2a46e5859138c83a75cd2f4141c5479ab9 (patch) | |
tree | e05e35550e6340b480d3596d4bcd83c469d6ad46 /drivers/ddr/microchip/ddr2_regs.h | |
parent | 048d795bb5b3d9c5701b4855f5e74bcf6849bf5e (diff) |
ext4: Fix integer overflow in ext4fs_read_symlink()
While zalloc() takes a size_t type, adding 1 to the le32 variable
will overflow.
A carefully crafted ext4 filesystem can exhibit an inode size of 0xffffffff
and as consequence zalloc() will do a zero allocation.
Later in the function the inode size is again used for copying data.
So an attacker can overwrite memory.
Avoid the overflow by using the __builtin_add_overflow() helper.
Signed-off-by: Richard Weinberger <richard@nod.at>
Diffstat (limited to 'drivers/ddr/microchip/ddr2_regs.h')
0 files changed, 0 insertions, 0 deletions