grub2/grub-core/fs/zfs
Darren Kenny 302c12ff57 zfs: Fix possible integer overflows
In all cases the problem is that the value being acted upon by
a left-shift is a 32-bit number which is then being used in the
context of a 64-bit number.

To avoid overflow we ensure that the number being shifted is 64-bit
before the shift is done.

Fixes: CID 73684, CID 73695, CID 73764

Signed-off-by: Darren Kenny <darren.kenny@oracle.com>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
2021-03-02 15:54:16 +01:00
..
zfs_fletcher.c Update GPL for ZFS code to version 3, move copyright lines for Vladimir and me to FSF (covered by our assignments) 2010-12-01 22:55:26 +01:00
zfs_lz4.c zfs: remove size_t typedef and use grub_size_t instead 2017-08-07 16:21:15 +02:00
zfs_lzjb.c Update GPL for ZFS code to version 3, move copyright lines for Vladimir and me to FSF (covered by our assignments) 2010-12-01 22:55:26 +01:00
zfs_sha256.c * conf/Makefile.common (CFLAGS_GNULIB): Add 2012-02-24 12:30:32 +01:00
zfs.c zfs: Fix possible integer overflows 2021-03-02 15:54:16 +01:00
zfscrypt.c malloc: Use overflow checking primitives where we do complex allocations 2020-07-29 16:55:47 +02:00
zfsinfo.c grub-core/fs/zfs/zfsinfo.c: memory leak in print_vdev_info 2014-12-01 20:54:12 +03:00