aboutsummaryrefslogtreecommitdiff
path: root/lib/fstream/compress/gzip.c
diff options
context:
space:
mode:
authorDavid Oberhollenzer <david.oberhollenzer@sigma-star.at>2021-06-24 14:32:38 +0200
committerDavid Oberhollenzer <david.oberhollenzer@sigma-star.at>2021-06-25 15:12:41 +0200
commit64da743ffc2a7d182a78872798b5dbdca39a1b16 (patch)
treebda266891e240fda999464f995401d3aa371672f /lib/fstream/compress/gzip.c
parente0cab1937a05d5c9740adf10613aa183eee7d99c (diff)
libfstream: guard against potential integer overflows
The differen compressor libraries use differnt integer types to tally the buffer sizes. The libfstream library uses size_t, which may be bigger than the actualy types, potentially causing an overflow if trying to compress to much at once. Signed-off-by: David Oberhollenzer <david.oberhollenzer@sigma-star.at>
Diffstat (limited to 'lib/fstream/compress/gzip.c')
-rw-r--r--lib/fstream/compress/gzip.c10
1 files changed, 9 insertions, 1 deletions
diff --git a/lib/fstream/compress/gzip.c b/lib/fstream/compress/gzip.c
index f604b71..e69f183 100644
--- a/lib/fstream/compress/gzip.c
+++ b/lib/fstream/compress/gzip.c
@@ -20,7 +20,15 @@ static int flush_inbuf(ostream_comp_t *base, bool finish)
size_t have;
int ret;
- gzip->strm.avail_in = base->inbuf_used;
+ if (sizeof(size_t) > sizeof(uInt)) {
+ gzip->strm.avail_in = ~((uInt)0);
+
+ if ((size_t)gzip->strm.avail_in > base->inbuf_used)
+ gzip->strm.avail_in = (uInt)base->inbuf_used;
+ } else {
+ gzip->strm.avail_in = (uInt)base->inbuf_used;
+ }
+
gzip->strm.next_in = base->inbuf;
do {