ext4: fix potential integer overflow
Since sizeof(ext_new_group_data) > sizeof(ext_new_flex_group_data), integer overflow could be happened. Therefore, need to fix integer overflow sanitization. Cc: stable@vger.kernel.org Signed-off-by: Insu Yun <wuninsu@gmail.com> Signed-off-by: Theodore Ts'o <tytso@mit.edu>
This commit is contained in:
@@ -198,7 +198,7 @@ static struct ext4_new_flex_group_data *alloc_flex_gd(unsigned long flexbg_size)
|
|||||||
if (flex_gd == NULL)
|
if (flex_gd == NULL)
|
||||||
goto out3;
|
goto out3;
|
||||||
|
|
||||||
if (flexbg_size >= UINT_MAX / sizeof(struct ext4_new_flex_group_data))
|
if (flexbg_size >= UINT_MAX / sizeof(struct ext4_new_group_data))
|
||||||
goto out2;
|
goto out2;
|
||||||
flex_gd->count = flexbg_size;
|
flex_gd->count = flexbg_size;
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user