Skip to content

Add integer overflow checks in Program::LoadSegment#19268

Open
rascani wants to merge 1 commit intopytorch:mainfrom
rascani:export-D103467784
Open

Add integer overflow checks in Program::LoadSegment#19268
rascani wants to merge 1 commit intopytorch:mainfrom
rascani:export-D103467784

Conversation

@rascani
Copy link
Copy Markdown
Contributor

@rascani rascani commented May 1, 2026

Summary:
Add overflow protection to pointer arithmetic in LoadSegment() and load_mutable_subsegment_into().

Three additions were unchecked:

  1. segment_base_offset_ + segment->offset() in LoadSegment() (line 563) — a malicious .pte file can set segment->offset() near UINT64_MAX, wrapping the sum to a small value and causing the loader to read from an unintended file position.

  2. offset + size in load_mutable_subsegment_into() — overflow before the bounds check against segment->size() would bypass the validation entirely.

  3. segment_base_offset_ + segment->offset() + offset in load_mutable_subsegment_into() (line 649) — a triple addition with no overflow check on any intermediate result. Now computed in two validated steps.

The overflow checks use the same ET_CHECK_OR_RETURN_ERROR pattern already established at lines 95-100 for the header-level segment validation.

MACA-2026-001 (T266924552).

Differential Revision: D103467784

Summary:
Add overflow protection to pointer arithmetic in `LoadSegment()` and `load_mutable_subsegment_into()`.

Three additions were unchecked:

1. `segment_base_offset_ + segment->offset()` in `LoadSegment()` (line 563) — a malicious `.pte` file can set `segment->offset()` near `UINT64_MAX`, wrapping the sum to a small value and causing the loader to read from an unintended file position.

2. `offset + size` in `load_mutable_subsegment_into()` — overflow before the bounds check against `segment->size()` would bypass the validation entirely.

3. `segment_base_offset_ + segment->offset() + offset` in `load_mutable_subsegment_into()` (line 649) — a triple addition with no overflow check on any intermediate result. Now computed in two validated steps.

The overflow checks use the same `ET_CHECK_OR_RETURN_ERROR` pattern already established at lines 95-100 for the header-level segment validation.

MACA-2026-001 (T266924552).

Differential Revision: D103467784
@pytorch-bot
Copy link
Copy Markdown

pytorch-bot Bot commented May 1, 2026

🔗 Helpful Links

🧪 See artifacts and rendered test results at hud.pytorch.org/pr/pytorch/executorch/19268

Note: Links to docs will display an error until the docs builds have been completed.

❌ 1 New Failure, 2 Unrelated Failures

As of commit 066e3f8 with merge base a3dd0fa (image):

NEW FAILURE - The following job has failed:

BROKEN TRUNK - The following jobs failed but were present on the merge base:

👉 Rebase onto the `viable/strict` branch to avoid these failures

This comment was automatically generated by Dr. CI and updates every 15 minutes.

@meta-cla meta-cla Bot added the CLA Signed This label is managed by the Facebook bot. Authors need to sign the CLA before a PR can be reviewed. label May 1, 2026
@meta-codesync
Copy link
Copy Markdown
Contributor

meta-codesync Bot commented May 1, 2026

@rascani has exported this pull request. If you are a Meta employee, you can view the originating Diff in D103467784.

@github-actions
Copy link
Copy Markdown

github-actions Bot commented May 1, 2026

This PR needs a release notes: label

If your change should be included in the release notes (i.e. would users of this library care about this change?), please use a label starting with release notes:. This helps us keep track and include your important work in the next release notes.

To add a label, you can comment to pytorchbot, for example
@pytorchbot label "release notes: none"

For more information, see
https://github.com/pytorch/pytorch/wiki/PyTorch-AutoLabel-Bot#why-categorize-for-release-notes-and-how-does-it-work.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

CLA Signed This label is managed by the Facebook bot. Authors need to sign the CLA before a PR can be reviewed. fb-exported meta-exported

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant