From 914812a9bf76bc57e9c7bad54f1f6c4c99e8d1ca Mon Sep 17 00:00:00 2001 From: Christopher Ferris Date: Mon, 15 Jul 2024 20:26:19 +0000 Subject: lib: avoid overflow in computation of s_seq_next On some systems, the clock is reset, or is lost, so the value returned by the time function can be a very small value. In that case, the _badrandom_from_time function returns a large value close to the maximum unsigned int value for s_seq_next. This can lead to the value wrapping around fairly quickly. When compiling the library with the unsigned-integer-overflow sanitizer enabled, this causes an abort. Detect this potential wrap around condition and avoid it. https://github.com/thom311/libnl/pull/395 --- lib/nl.c | 2 +- lib/socket.c | 5 +++++ 2 files changed, 6 insertions(+), 1 deletion(-) diff --git a/lib/nl.c b/lib/nl.c index a24c026..1225eba 100644 --- a/lib/nl.c +++ b/lib/nl.c @@ -486,7 +486,7 @@ void nl_complete_msg(struct nl_sock *sk, struct nl_msg *msg) nlh->nlmsg_pid = nl_socket_get_local_port(sk); if (nlh->nlmsg_seq == NL_AUTO_SEQ) - nlh->nlmsg_seq = sk->s_seq_next++; + nlh->nlmsg_seq = nl_socket_use_seq(sk); if (msg->nm_protocol == -1) msg->nm_protocol = sk->s_proto; diff --git a/lib/socket.c b/lib/socket.c index 742cdac..4e64cbb 100644 --- a/lib/socket.c +++ b/lib/socket.c @@ -24,6 +24,7 @@ #include "nl-default.h" #include +#include #include #include @@ -316,6 +317,10 @@ void nl_socket_disable_seq_check(struct nl_sock *sk) */ unsigned int nl_socket_use_seq(struct nl_sock *sk) { + if (sk->s_seq_next == UINT_MAX) { + sk->s_seq_next = 0; + return UINT_MAX; + } return sk->s_seq_next++; } -- cgit v0.12