From 71d84750188dc6e1d45a9d05e40b00c430dc5637 Mon Sep 17 00:00:00 2001 From: Will Newton Date: Fri, 16 Aug 2013 11:59:37 +0100 Subject: [PATCH] malloc: Check for integer overflow in valloc. A large bytes parameter to valloc could cause an integer overflow and corrupt allocator internals. Check the overflow does not occur before continuing with the allocation. ChangeLog: 2013-09-11 Will Newton [BZ #15856] * malloc/malloc.c (__libc_valloc): Check the value of bytes does not overflow. --- ChangeLog | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/ChangeLog b/ChangeLog index c448dda711a..2c9dc89a5b8 100644 --- a/ChangeLog +++ b/ChangeLog @@ -335,6 +335,12 @@ * malloc/malloc.c (__libc_valloc): Check the value of bytes does not overflow. +2013-09-11 Will Newton + + [BZ #15856] + * malloc/malloc.c (__libc_valloc): Check the value of bytes + does not overflow. + 2013-09-11 Will Newton [BZ #15855] -- 2.47.2