commit 004bdcf210baf1a63772bb7eca452bb0aeba010b
parent ef3e52a7f560f66df8ed1e2487872a1e62c5cedb
Author: Laslo Hunhold <dev@frign.de>
Date:   Sat,  8 Oct 2022 13:13:03 +0200
Prevent undefined behaviour in herodotus_reader_copy()
The first part usually catches harmless cases like "NULL + 0", but the
last part prevents integer overflow in some really crazy cases that
are unlikely but can still happen.
Signed-off-by: Laslo Hunhold <dev@frign.de>
Diffstat:
1 file changed, 15 insertions(+), 5 deletions(-)
diff --git a/src/util.c b/src/util.c
@@ -37,23 +37,33 @@ herodotus_reader_copy(const HERODOTUS_READER *src, HERODOTUS_READER *dest)
 	 */
 	dest->type = src->type;
 	if (src->type == HERODOTUS_TYPE_CODEPOINT) {
-		dest->src = ((const uint_least32_t *)(src->src)) + src->off;
+		dest->src = (src->src == NULL) ? NULL :
+		            ((const uint_least32_t *)(src->src)) + src->off;
 	} else { /* src->type == HERODOTUS_TYPE_UTF8 */
-		dest->src = ((const char *)(src->src)) + src->off;
+		dest->src = (src->src == NULL) ? NULL :
+		            ((const char *)(src->src)) + src->off;
 	}
 	if (src->srclen == SIZE_MAX) {
 		dest->srclen = SIZE_MAX;
 	} else {
-		dest->srclen = src->srclen - src->off;
+		dest->srclen = (src->off < src->srclen) ? src->srclen - src->off : 0;
 	}
 	dest->off = 0;
 	dest->terminated_by_null = src->terminated_by_null;
 
 	for (i = 0; i < LEN(src->soft_limit); i++) {
 		if (src->soft_limit[i] == SIZE_MAX) {
-			dest->soft_limit[i] = src->soft_limit[i];
+			dest->soft_limit[i] = SIZE_MAX;
 		} else {
-			dest->soft_limit[i] = src->soft_limit[i] - src->off;
+			/*
+			 * if we have a degenerate case where the offset is
+			 * higher than the soft-limit, we simply clamp the
+			 * soft-limit to zero given we can't decide here
+			 * to release the limit and, instead, we just
+			 * prevent any more reads
+			 */
+			dest->soft_limit[i] = (src->off < src->soft_limit[i]) ?
+				src->soft_limit[i] - src->off : 0;
 		}
 	}
 }