Blame SOURCES/e2fsprogs-1.45.5-libext2fs-fix-UBSan-when-updating-an-inline_data-fil.patch

393826
From bee65149cc025522ae0e2c37a0ce817641ebac28 Mon Sep 17 00:00:00 2001
393826
From: Theodore Ts'o <tytso@mit.edu>
393826
Date: Mon, 4 Nov 2019 18:43:49 -0500
393826
Subject: [PATCH 02/10] libext2fs: fix UBSan when updating an inline_data file
393826
393826
What memcpy does when the length is zero is not well-defined.  So
393826
avoid it.
393826
393826
Bug: https://github.com/tytso/e2fsprogs/issues/25
393826
Signed-off-by: Theodore Ts'o <tytso@mit.edu>
393826
---
393826
 lib/ext2fs/ext_attr.c | 5 +++--
393826
 1 file changed, 3 insertions(+), 2 deletions(-)
393826
393826
diff --git a/lib/ext2fs/ext_attr.c b/lib/ext2fs/ext_attr.c
393826
index 78a823a9..affc1a8f 100644
393826
--- a/lib/ext2fs/ext_attr.c
393826
+++ b/lib/ext2fs/ext_attr.c
393826
@@ -1550,14 +1550,15 @@ errcode_t ext2fs_xattr_set(struct ext2_xattr_handle *h,
393826
 						       new_value, &value_len);
393826
 		if (ret)
393826
 			goto out;
393826
-	} else
393826
+	} else if (value_len)
393826
 		memcpy(new_value, value, value_len);
393826
 
393826
 	/* Imitate kernel behavior by skipping update if value is the same. */
393826
 	for (x = h->attrs; x < h->attrs + h->count; x++) {
393826
 		if (!strcmp(x->name, name)) {
393826
 			if (!x->ea_ino && x->value_len == value_len &&
393826
-			    !memcmp(x->value, new_value, value_len)) {
393826
+			    (!value_len ||
393826
+			     !memcmp(x->value, new_value, value_len))) {
393826
 				ret = 0;
393826
 				goto out;
393826
 			}
393826
-- 
393826
2.21.1
393826