This is the mail archive of the
libc-alpha@sourceware.org
mailing list for the glibc project.
Re: [PATCH v2] [BZ #15856] malloc: Check for integer overflow in valloc.
- From: Will Newton <will dot newton at linaro dot org>
- To: libc-alpha <libc-alpha at sourceware dot org>
- Cc: Patch Tracking <patches at linaro dot org>
- Date: Mon, 9 Sep 2013 09:25:26 +0100
- Subject: Re: [PATCH v2] [BZ #15856] malloc: Check for integer overflow in valloc.
- Authentication-results: sourceware.org; auth=none
- References: <521327D4 dot 7020006 at linaro dot org>
On 20 August 2013 09:24, Will Newton <will.newton@linaro.org> wrote:
>
> A large bytes parameter to valloc could cause an integer overflow
> and corrupt allocator internals. Check the overflow does not occur
> before continuing with the allocation.
>
> ChangeLog:
>
> 2013-08-16 Will Newton <will.newton@linaro.org>
>
> [BZ #15856]
> * malloc/malloc.c (__libc_valloc): Check the value of bytes
> does not overflow.
> ---
> malloc/malloc.c | 4 ++++
> 1 file changed, 4 insertions(+)
>
> Changes in v2:
> - Add BZ number
Ping?
--
Will Newton
Toolchain Working Group, Linaro