This is the mail archive of the
libc-alpha@sourceware.org
mailing list for the glibc project.
Re: [PATCH v2] [BZ #15855] malloc: Check for integer overflow in pvalloc.
- From: Will Newton <will dot newton at linaro dot org>
- To: libc-alpha <libc-alpha at sourceware dot org>
- Cc: Patch Tracking <patches at linaro dot org>
- Date: Thu, 29 Aug 2013 09:28:16 +0100
- Subject: Re: [PATCH v2] [BZ #15855] malloc: Check for integer overflow in pvalloc.
- Authentication-results: sourceware.org; auth=none
- References: <521327C7 dot 3020501 at linaro dot org>
On 20 August 2013 09:24, Will Newton <will.newton@linaro.org> wrote:
>
> A large bytes parameter to pvalloc could cause an integer overflow
> and corrupt allocator internals. Check the overflow does not occur
> before continuing with the allocation.
>
> ChangeLog:
>
> 2013-08-12 Will Newton <will.newton@linaro.org>
>
> [BZ #15855]
> * malloc/malloc.c (__libc_pvalloc): Check the value of bytes
> does not overflow.
> ---
> malloc/malloc.c | 4 ++++
> 1 file changed, 4 insertions(+)
Does anybody have any comments on this patch series?
Thanks,
--
Will Newton
Toolchain Working Group, Linaro