[CVE-2018-17942] vasnprintf: Fix heap memory overrun bug. 98/252998/1 accepted/tizen_6.5_base accepted/tizen_6.5_base_tool accepted/tizen_7.0_base accepted/tizen_7.0_base_hotfix accepted/tizen_7.0_base_tool accepted/tizen_7.0_base_tool_hotfix tizen_6.5_base tizen_7.0_base tizen_7.0_base_hotfix accepted/tizen/6.5/base/20230714.002752 accepted/tizen/6.5/base/tool/20211028.034937 accepted/tizen/7.0/base/20230714.003200 accepted/tizen/7.0/base/hotfix/20230714.004009 accepted/tizen/7.0/base/tool/20221028.113327 accepted/tizen/7.0/base/tool/hotfix/20221115.085109 accepted/tizen/base/tool/20210205.014735 submit/tizen_6.5_base/20211026.180901 submit/tizen_6.5_base/20211027.183101 submit/tizen_6.5_base/20211027.201201 submit/tizen_6.5_base/20211028.121101 submit/tizen_6.5_base/20211028.124201 submit/tizen_7.0_base/20221028.200901 submit/tizen_7.0_base_hotfix/20221115.161501 submit/tizen_base/20210204.003912 submit/tizen_base/20210204.012023 submit/tizen_base/20210204.234525 tizen_6.5.m2_release tizen_7.0_m2_release
authorBruno Haible <bruno@clisp.org>
Sun, 23 Sep 2018 12:13:52 +0000 (14:13 +0200)
committerDongHun Kwak <dh0128.kwak@samsung.com>
Thu, 4 Feb 2021 00:35:18 +0000 (09:35 +0900)
Reported by Ben Pfaff <blp@cs.stanford.edu> in
<https://lists.gnu.org/archive/html/bug-gnulib/2018-09/msg00107.html>.

* lib/vasnprintf.c (convert_to_decimal): Allocate one more byte of
memory.

Change-Id: I3e78111a16ac31b690caa29c1dfbb1cb7262ecd1
Signed-off-by: DongHun Kwak <dh0128.kwak@samsung.com>
lib/vasnprintf.c

index c60888c..5e0de56 100644 (file)
@@ -701,7 +701,9 @@ convert_to_decimal (mpn_t a, size_t extra_zeroes)
   size_t a_len = a.nlimbs;
   /* 0.03345 is slightly larger than log(2)/(9*log(10)).  */
   size_t c_len = 9 * ((size_t)(a_len * (GMP_LIMB_BITS * 0.03345f)) + 1);
-  char *c_ptr = (char *) malloc (xsum (c_len, extra_zeroes));
+  /* We need extra_zeroes bytes for zeroes, followed by c_len bytes for the
+     digits of a, followed by 1 byte for the terminating NUL.  */
+  char *c_ptr = (char *) malloc (xsum (xsum (extra_zeroes, c_len), 1));
   if (c_ptr != NULL)
     {
       char *d_ptr = c_ptr;