Uploaded image for project: 'Thrift'
  1. Thrift
  2. THRIFT-3821

TMemoryBuffer buffer may overflow when resizing

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Closed
    • Major
    • Resolution: Fixed
    • 0.9.3
    • 0.11.0
    • C++ - Library
    • None

    Description

      In ensurecanwrite():

        uint32_t new_size = bufferSize_;
        while (len > avail) {
          new_size = new_size > 0 ? new_size * 2 : 1;
          avail = available_write() + (new_size - bufferSize_);
        }
      
        // Allocate into a new pointer so we don't bork ours if it fails.
        uint8_t* new_buffer = static_cast<uint8_t*>(std::realloc(buffer_, new_size));
        if (new_buffer == NULL) {
          throw std::bad_alloc();
        }
      
        rBase_ = new_buffer + (rBase_ - buffer_);
        rBound_ = new_buffer + (rBound_ - buffer_);
        wBase_ = new_buffer + (wBase_ - buffer_);
        wBound_ = new_buffer + new_size;
        buffer_ = new_buffer;
        bufferSize_ = new_size;
      
      

      If old bufferSize_ is lager than 2gb, then calculating new size will overflow.
      i.e. if bufferSize_ = 3355443200, then new buffer size will be 2415919104, which is less than old size.

      However,

      avail = available_write() + (new_size - bufferSize_) 
      

      overflows again, so we will end up with an shrinked buffer.

      What is worse is that after

        wBase_ = new_buffer + (wBase_ - buffer_);
        wBound_ = new_buffer + new_size;
      

      wBase_ stays the same, but wBound_ becomes lower than it. What happens next is that uint32_t avail = available_write() may overflow every time subsequently. and thrift writes to unknown memory.

      Attachments

        Issue Links

          Activity

            People

              jking3 James E. King III
              HuaisiXu Huaisi Xu
              Votes:
              0 Vote for this issue
              Watchers:
              6 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: