[PATCH 0/4] fix integer overflows in filesystem code
Simon Glass
sjg at chromium.org
Wed Dec 31 02:48:38 CET 2025
Hi Timo,
On Mon, 29 Dec 2025 at 07:48, Tom Rini <trini at konsulko.com> wrote:
>
> On Sun, Dec 28, 2025 at 04:45:08PM +0000, Timo tp Preißl wrote:
>
> > Timo tp Preißl (4):
> >
> > This patch series fixes potential integer overflows in U-Boot
> > filesystem code. It includes the following patches:
> > fs: prevent integer overflow in fs.c do_mv()
> > fs: zfs: prevent integer overflow in zfs_nvlist_lookup_nvlist()
> > fs: squashfs: prevent integer overflow in sqfs_concat_tokens()
> > fs: ext4: preventing integer overflow in ext4fs_get_bgdtable()
> >
> > fs/ext4/ext4_write.c | 7 ++++++-
> > fs/fs.c | 18 ++++++++++++++----
> > fs/squashfs/sqfs.c | 9 +++++++--
> > fs/zfs/zfs.c | 9 ++++++---
> > 4 files changed, 33 insertions(+), 10 deletions(-)
> >
> > All patches have been tested with:
> > - sandbox_defconfig
>
> First, thank you for looking in to this. Second, please run
> "scripts/checkpatch.pl" against each as there's inconsistent spacing
> used here and that makes review harder (and needs to be fixed before
> applying). Finally, for each commit please elaborate on the problem
> being fixed (for example "if ... is corrupted then ... could
> oveverflow"). Thanks!
In case it helps, there was an earlier series here:
https://patchwork.ozlabs.org/project/uboot/list/?series=456262&state=*
Regards,
Simon
More information about the U-Boot
mailing list