* src/sparse.c (pax_decode_header): Check if sp.offset+sp.numbytes
falls within the reported file size. Check for possible integer
overflow.
}
sp.offset = u;
COPY_BUF (blk,nbuf,p);
- if (!decode_num (&u, nbuf, TYPE_MAXIMUM (off_t)))
+ if (!decode_num (&u, nbuf, TYPE_MAXIMUM (off_t))
+ || INT_ADD_OVERFLOW (sp.offset, u)
+ || file->stat_info->stat.st_size < sp.offset + u)
{
ERROR ((0, 0, _("%s: malformed sparse archive member"),
file->stat_info->orig_file_name));