xz: avoid overlapping memcpy() with invalid input with in-place decompression
authorLasse Collin <lasse.collin@tukaani.org>
Thu, 10 Mar 2022 08:47:02 +0000 (09:47 +0100)
committerJan Beulich <jbeulich@suse.com>
Thu, 10 Mar 2022 08:47:02 +0000 (09:47 +0100)
commit6a6600cebbbe7cc734b388f48aa3475d75916e71
tree268ab629ac67d77f101bbafed353c2851ac81a50
parent38fbfddf660de9572b1c906315a345b1470d3a04
xz: avoid overlapping memcpy() with invalid input with in-place decompression

With valid files, the safety margin described in lib/decompress_unxz.c
ensures that these buffers cannot overlap. But if the uncompressed size
of the input is larger than the caller thought, which is possible when
the input file is invalid/corrupt, the buffers can overlap. Obviously
the result will then be garbage (and usually the decoder will return
an error too) but no other harm will happen when such an over-run occurs.

This change only affects uncompressed LZMA2 chunks and so this
should have no effect on performance.

Link: https://lore.kernel.org/r/20211010213145.17462-2-xiang@kernel.org
Signed-off-by: Lasse Collin <lasse.collin@tukaani.org>
Signed-off-by: Gao Xiang <hsiangkao@linux.alibaba.com>
Origin: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 83d3c4f22a36
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>
Acked-by: Andrew Cooper <andrew.cooper3@citrix.com>
master commit: 10454f381f9157bce26d5db15e07e857b317b4af
master date: 2022-03-07 09:08:08 +0100
xen/common/unxz.c
xen/common/xz/dec_lzma2.c