[PATCH 0/4] fix integer overflows in filesystem code

Tom Rini trini at konsulko.com
Wed Dec 31 02:54:50 CET 2025


On Tue, Dec 30, 2025 at 06:48:38PM -0700, Simon Glass wrote:
> Hi Timo,
> 
> On Mon, 29 Dec 2025 at 07:48, Tom Rini <trini at konsulko.com> wrote:
> >
> > On Sun, Dec 28, 2025 at 04:45:08PM +0000, Timo tp Preißl wrote:
> >
> > > Timo tp Preißl (4):
> > >
> > > This patch series fixes potential integer overflows in U-Boot
> > > filesystem code. It includes the following patches:
> > >   fs: prevent integer overflow in fs.c do_mv()
> > >   fs: zfs: prevent integer overflow in zfs_nvlist_lookup_nvlist()
> > >   fs: squashfs: prevent integer overflow in sqfs_concat_tokens()
> > >   fs: ext4: preventing integer overflow in ext4fs_get_bgdtable()
> > >
> > >  fs/ext4/ext4_write.c |  7 ++++++-
> > >  fs/fs.c              | 18 ++++++++++++++----
> > >  fs/squashfs/sqfs.c   |  9 +++++++--
> > >  fs/zfs/zfs.c         |  9 ++++++---
> > >  4 files changed, 33 insertions(+), 10 deletions(-)
> > >
> > > All patches have been tested with:
> > > - sandbox_defconfig
> >
> > First, thank you for looking in to this. Second, please run
> > "scripts/checkpatch.pl" against each as there's inconsistent spacing
> > used here and that makes review harder (and needs to be fixed before
> > applying). Finally, for each commit please elaborate on the problem
> > being fixed (for example "if ... is corrupted then ... could
> > oveverflow"). Thanks!
> 
> In case it helps, there was an earlier series here:
> 
> https://patchwork.ozlabs.org/project/uboot/list/?series=456262&state=*

Please don't further confuse things Simon, thanks.

-- 
Tom
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 228 bytes
Desc: not available
URL: <https://lists.denx.de/pipermail/u-boot/attachments/20251230/44b0b42c/attachment.sig>


More information about the U-Boot mailing list