Fix Integer overflow in binary CPIO handler#5089
Open
sectroyer wants to merge 1 commit intoMidnightCommander:masterfrom
Open
Fix Integer overflow in binary CPIO handler#5089sectroyer wants to merge 1 commit intoMidnightCommander:masterfrom
sectroyer wants to merge 1 commit intoMidnightCommander:masterfrom
Conversation
mc-worker
reviewed
Apr 16, 2026
| // case? | ||
|
|
||
| inode->linkname = g_malloc (st->st_size + 1); | ||
| if (st->st_size < 0 || (gsize) st->st_size >= G_MAXSIZE) |
Contributor
There was a problem hiding this comment.
Why do you reduce off_t to gsize? I think, sizeof (off_t) >= sizeof (gsize), so the correct way is
st->st_size >= (off_t) G_MAXSIZE
| #endif | ||
| st.st_size = ((off_t) u.buf.c_filesizes[0] << 16) | u.buf.c_filesizes[1]; | ||
|
|
||
| if (st.st_size < 0 || st.st_size > MC_MAXPATHLEN) |
Contributor
There was a problem hiding this comment.
Why do you compare file size with path length? It is correct for link not for regular file,
| u.st.st_size = hd.c_filesize; | ||
|
|
||
| if (u.st.st_size < 0 || u.st.st_size > MC_MAXPATHLEN) | ||
| { |
Author
There was a problem hiding this comment.
You are completely right. I have update the PR w newer fix.
…ndler Three changes addressing reviewer feedback: - cpio_create_entry: fix cast direction in the bounds check — compare against (off_t) G_MAXSIZE rather than casting st_size to gsize. Also add the MC_MAXPATHLEN upper bound here, co-located with the g_malloc call and applied only in the symlink code path where st_size is used as a path length. - cpio_read_bin_head: check only st_size < 0 (catches the signed integer overflow root cause). Remove the > MC_MAXPATHLEN bound which was too restrictive for non-symlink entries processed by this general-purpose function. - cpio_read_crc_head: same as cpio_read_bin_head. Signed-off-by: Michał Majchrowicz <sectroyer@gmail.com> Signed-off-by: Yury V. Zaytsev <yury@shurup.com>
mc-worker
reviewed
Apr 24, 2026
|
|
||
| inode->linkname = g_malloc (st->st_size + 1); | ||
| if (st->st_size < 0 || st->st_size >= (off_t) G_MAXSIZE | ||
| || st->st_size > MC_MAXPATHLEN) |
Contributor
There was a problem hiding this comment.
MC_MAXPATHLEN is definitely less than G_MAXSIZE. Thus 2nd test isn't needed.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Add a bounds check on st_size immediately after it is computed, before it is used in any arithmetic or allocation. A reasonable upper bound for a symlink target is MC_MAXPATHLEN (4096).