[PATCH 0/4] fix integer overflows in filesystem code
Tom Rini
trini at konsulko.com
Wed Dec 31 02:54:50 CET 2025
On Tue, Dec 30, 2025 at 06:48:38PM -0700, Simon Glass wrote:
> Hi Timo,
>
> On Mon, 29 Dec 2025 at 07:48, Tom Rini <trini at konsulko.com> wrote:
> >
> > On Sun, Dec 28, 2025 at 04:45:08PM +0000, Timo tp Preißl wrote:
> >
> > > Timo tp Preißl (4):
> > >
> > > This patch series fixes potential integer overflows in U-Boot
> > > filesystem code. It includes the following patches:
> > > fs: prevent integer overflow in fs.c do_mv()
> > > fs: zfs: prevent integer overflow in zfs_nvlist_lookup_nvlist()
> > > fs: squashfs: prevent integer overflow in sqfs_concat_tokens()
> > > fs: ext4: preventing integer overflow in ext4fs_get_bgdtable()
> > >
> > > fs/ext4/ext4_write.c | 7 ++++++-
> > > fs/fs.c | 18 ++++++++++++++----
> > > fs/squashfs/sqfs.c | 9 +++++++--
> > > fs/zfs/zfs.c | 9 ++++++---
> > > 4 files changed, 33 insertions(+), 10 deletions(-)
> > >
> > > All patches have been tested with:
> > > - sandbox_defconfig
> >
> > First, thank you for looking in to this. Second, please run
> > "scripts/checkpatch.pl" against each as there's inconsistent spacing
> > used here and that makes review harder (and needs to be fixed before
> > applying). Finally, for each commit please elaborate on the problem
> > being fixed (for example "if ... is corrupted then ... could
> > oveverflow"). Thanks!
>
> In case it helps, there was an earlier series here:
>
> https://patchwork.ozlabs.org/project/uboot/list/?series=456262&state=*
Please don't further confuse things Simon, thanks.
--
Tom
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 228 bytes
Desc: not available
URL: <https://lists.denx.de/pipermail/u-boot/attachments/20251230/44b0b42c/attachment.sig>
More information about the U-Boot
mailing list