summaryrefslogtreecommitdiff
path: root/src/libsystemd/sd-bus/bus-kernel.h
diff options
context:
space:
mode:
authorDaniel Mack <zonque@gmail.com>2014-03-08 14:18:48 +0100
committerDaniel Mack <zonque@gmail.com>2014-03-08 14:18:48 +0100
commitb629d0984206ad855cc0cb7e6a376c919f7bf366 (patch)
tree0df3316c68ea670e6efbfc8f19186907a17f39b7 /src/libsystemd/sd-bus/bus-kernel.h
parent2a781fc9bd33982c81e5ff75974a442a33d4f167 (diff)
sd-bus: check for potential integer overflow in KDBUS_ITEM_FOREACH()
For large values of item->size, the 'part' pointer can wrap around, which results in an illegal pointer, but currently passes the for-loop condition.
Diffstat (limited to 'src/libsystemd/sd-bus/bus-kernel.h')
-rw-r--r--src/libsystemd/sd-bus/bus-kernel.h3
1 files changed, 2 insertions, 1 deletions
diff --git a/src/libsystemd/sd-bus/bus-kernel.h b/src/libsystemd/sd-bus/bus-kernel.h
index c4722cbac6..a1e9691f1d 100644
--- a/src/libsystemd/sd-bus/bus-kernel.h
+++ b/src/libsystemd/sd-bus/bus-kernel.h
@@ -31,7 +31,8 @@
#define KDBUS_ITEM_FOREACH(part, head, first) \
for (part = (head)->first; \
- (uint8_t *)(part) < (uint8_t *)(head) + (head)->size; \
+ ((uint8_t *)(part) < (uint8_t *)(head) + (head)->size) && \
+ ((uint8_t *) part >= (uint8_t *) head); \
part = KDBUS_ITEM_NEXT(part))
#define KDBUS_ITEM_HEADER_SIZE offsetof(struct kdbus_item, data)