diff options
author | David Oberhollenzer <david.oberhollenzer@sigma-star.at> | 2021-06-24 14:32:38 +0200 |
---|---|---|
committer | David Oberhollenzer <david.oberhollenzer@sigma-star.at> | 2021-06-25 15:12:41 +0200 |
commit | 64da743ffc2a7d182a78872798b5dbdca39a1b16 (patch) | |
tree | bda266891e240fda999464f995401d3aa371672f /lib/fstream/compress/gzip.c | |
parent | e0cab1937a05d5c9740adf10613aa183eee7d99c (diff) |
libfstream: guard against potential integer overflows
The differen compressor libraries use differnt integer types to tally
the buffer sizes. The libfstream library uses size_t, which may be
bigger than the actualy types, potentially causing an overflow if
trying to compress to much at once.
Signed-off-by: David Oberhollenzer <david.oberhollenzer@sigma-star.at>
Diffstat (limited to 'lib/fstream/compress/gzip.c')
-rw-r--r-- | lib/fstream/compress/gzip.c | 10 |
1 files changed, 9 insertions, 1 deletions
diff --git a/lib/fstream/compress/gzip.c b/lib/fstream/compress/gzip.c index f604b71..e69f183 100644 --- a/lib/fstream/compress/gzip.c +++ b/lib/fstream/compress/gzip.c @@ -20,7 +20,15 @@ static int flush_inbuf(ostream_comp_t *base, bool finish) size_t have; int ret; - gzip->strm.avail_in = base->inbuf_used; + if (sizeof(size_t) > sizeof(uInt)) { + gzip->strm.avail_in = ~((uInt)0); + + if ((size_t)gzip->strm.avail_in > base->inbuf_used) + gzip->strm.avail_in = (uInt)base->inbuf_used; + } else { + gzip->strm.avail_in = (uInt)base->inbuf_used; + } + gzip->strm.next_in = base->inbuf; do { |