mirror of
https://github.com/zerotier/ZeroTierOne.git
synced 2025-06-06 20:43:44 +02:00
Fix integer overflow in _sdsMakeRoomFor (CVE-2021-41099)
This commit is contained in:
parent
dcadc2c4d4
commit
7cc926b2de
1 changed files with 4 additions and 2 deletions
|
@ -194,7 +194,7 @@ void sdsclear(sds s) {
|
||||||
sds sdsMakeRoomFor(sds s, size_t addlen) {
|
sds sdsMakeRoomFor(sds s, size_t addlen) {
|
||||||
void *sh, *newsh;
|
void *sh, *newsh;
|
||||||
size_t avail = sdsavail(s);
|
size_t avail = sdsavail(s);
|
||||||
size_t len, newlen;
|
size_t len, newlen, reqlen;
|
||||||
char type, oldtype = s[-1] & SDS_TYPE_MASK;
|
char type, oldtype = s[-1] & SDS_TYPE_MASK;
|
||||||
int hdrlen;
|
int hdrlen;
|
||||||
|
|
||||||
|
@ -203,7 +203,8 @@ sds sdsMakeRoomFor(sds s, size_t addlen) {
|
||||||
|
|
||||||
len = sdslen(s);
|
len = sdslen(s);
|
||||||
sh = (char*)s-sdsHdrSize(oldtype);
|
sh = (char*)s-sdsHdrSize(oldtype);
|
||||||
newlen = (len+addlen);
|
reqlen = newlen = (len+addlen);
|
||||||
|
assert(newlen > len); /* Catch size_t overflow */
|
||||||
if (newlen < SDS_MAX_PREALLOC)
|
if (newlen < SDS_MAX_PREALLOC)
|
||||||
newlen *= 2;
|
newlen *= 2;
|
||||||
else
|
else
|
||||||
|
@ -217,6 +218,7 @@ sds sdsMakeRoomFor(sds s, size_t addlen) {
|
||||||
if (type == SDS_TYPE_5) type = SDS_TYPE_8;
|
if (type == SDS_TYPE_5) type = SDS_TYPE_8;
|
||||||
|
|
||||||
hdrlen = sdsHdrSize(type);
|
hdrlen = sdsHdrSize(type);
|
||||||
|
assert(hdrlen + newlen + 1 > reqlen); /* Catch size_t overflow */
|
||||||
if (oldtype==type) {
|
if (oldtype==type) {
|
||||||
newsh = s_realloc(sh, hdrlen+newlen+1);
|
newsh = s_realloc(sh, hdrlen+newlen+1);
|
||||||
if (newsh == NULL) return NULL;
|
if (newsh == NULL) return NULL;
|
||||||
|
|
Loading…
Add table
Reference in a new issue