[PATCH v3 2/4] fs: prevent integer overflow in zfs_nvlist_lookup

Simon Glass sjg at chromium.org
Tue Jan 13 00:38:20 CET 2026


On Fri, 9 Jan 2026 at 06:08, Timo tp Preißl <t.preissl at proton.me> wrote:
>
> An integer overflow in nvlist size calculation could lead
> to under-allocation and heap buffer overflow.
>
> Signed-off-by: Timo tp Preißl <t.preissl at proton.me>
> ---
>  fs/zfs/zfs.c | 6 +++++-
>  1 file changed, 5 insertions(+), 1 deletion(-)
>

Reviewed-by: Simon Glass <simon.glass at canonical.com>


> diff --git a/fs/zfs/zfs.c b/fs/zfs/zfs.c
> index 410a61aa611..c7502c344ff 100644
> --- a/fs/zfs/zfs.c
> +++ b/fs/zfs/zfs.c
> @@ -1617,6 +1617,7 @@ zfs_nvlist_lookup_nvlist(char *nvlist, char *name)
>         char *ret;
>         size_t size;
>         int found;
> +       size_t alloc;
>
>         found = nvlist_find_value(nvlist, name, DATA_TYPE_NVLIST, &nvpair,
>                                                           &size, 0);
> @@ -1627,7 +1628,10 @@ zfs_nvlist_lookup_nvlist(char *nvlist, char *name)
>          * nvlist to hold the encoding method, and two zero uint32's after the
>          * nvlist as the NULL terminator.
>          */
> -       ret = calloc(1, size + 3 * sizeof(uint32_t));
> +       if (__builtin_add_overflow(size, 3 * sizeof(uint32_t), &alloc))
> +               return 0;
> +
> +       ret = calloc(1, alloc);
>         if (!ret)
>                 return 0;
>         memcpy(ret, nvlist, sizeof(uint32_t));
> --
> 2.43.0
>
>


More information about the U-Boot mailing list