From 7c6d3a6f931a9abd21d813a4037180e7894bc15a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Benjamin=20Cab=C3=A9?= Date: Thu, 30 Jan 2025 10:45:58 +0100 Subject: [PATCH] fs: ext2: Fix potential integer overflow in disk access size calculation MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Cast sector_count and sector_size to uint64_t to prevent potential integer overflow when calculating total device size in disk_access_device_size(). Fixes Coverity issue CID-322647 Signed-off-by: Benjamin Cabé --- subsys/fs/ext2/ext2_disk_access.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/subsys/fs/ext2/ext2_disk_access.c b/subsys/fs/ext2/ext2_disk_access.c index 96ded31f8e3..c068473dc2f 100644 --- a/subsys/fs/ext2/ext2_disk_access.c +++ b/subsys/fs/ext2/ext2_disk_access.c @@ -23,7 +23,7 @@ static int64_t disk_access_device_size(struct ext2_data *fs) { struct disk_data *disk = fs->backend; - return disk->sector_count * disk->sector_size; + return (uint64_t)disk->sector_count * (uint64_t)disk->sector_size; } static int64_t disk_access_write_size(struct ext2_data *fs)