From: Maxim Petrov Date: Wed, 17 Nov 2021 19:11:24 +0000 (+0300) Subject: ip/ipnexthop: fix unsigned overflow in parse_nh_group_type_res() X-Git-Tag: v5.16.0~6 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=5f8bb902e14f91161f9ed214d5fc1d813af8ed88;p=thirdparty%2Fiproute2.git ip/ipnexthop: fix unsigned overflow in parse_nh_group_type_res() 0UL has type 'unsigned long' which is likely to be 64bit on modern machines. At the same time, the '{idle,unbalanced}_timer' variables are declared as u32, so these variables cannot be greater than '~0UL / 100' when 'unsigned long' is 64 bits. In such condition it is still possible to pass the check but get the overflow later when the timers are multiplied by 100 in 'addattr32'. Fix the possible overflow by changing '~0UL' to 'UINT32_MAX'. Fixes: 91676718228b ("nexthop: Add support for resilient nexthop groups") Signed-off-by: Maxim Petrov Reviewed-by: Ido Schimmel Signed-off-by: Stephen Hemminger --- diff --git a/ip/ipnexthop.c b/ip/ipnexthop.c index 83a5540e7..2f448449e 100644 --- a/ip/ipnexthop.c +++ b/ip/ipnexthop.c @@ -6,6 +6,7 @@ */ #include +#include #include #include #include @@ -840,7 +841,7 @@ static void parse_nh_group_type_res(struct nlmsghdr *n, int maxlen, int *argcp, NEXT_ARG(); if (get_unsigned(&idle_timer, *argv, 0) || - idle_timer >= ~0UL / 100) + idle_timer >= UINT32_MAX / 100) invarg("invalid idle timer value", *argv); addattr32(n, maxlen, NHA_RES_GROUP_IDLE_TIMER, @@ -850,7 +851,7 @@ static void parse_nh_group_type_res(struct nlmsghdr *n, int maxlen, int *argcp, NEXT_ARG(); if (get_unsigned(&unbalanced_timer, *argv, 0) || - unbalanced_timer >= ~0UL / 100) + unbalanced_timer >= UINT32_MAX / 100) invarg("invalid unbalanced timer value", *argv); addattr32(n, maxlen, NHA_RES_GROUP_UNBALANCED_TIMER,