summaryrefslogtreecommitdiff
path: root/lib/ofp-actions.c
diff options
context:
space:
mode:
authorToms Atteka <cpp.code.lv@gmail.com>2019-03-20 13:40:19 -0700
committerBen Pfaff <blp@ovn.org>2019-03-26 14:12:37 -0700
commit8e738337a2c25c3d6ede2829d6ffd9af6bcd36a5 (patch)
tree691eeb76026dfd7410ceddf1555548718c5304e4 /lib/ofp-actions.c
parent723b6ab2df688b8bfe2fd5e3e2275749040a616c (diff)
downloadopenvswitch-8e738337a2c25c3d6ede2829d6ffd9af6bcd36a5.tar.gz
lib: added check to prevent int overflow
If enough large input is given ofpact_finish will fail. Implemented ofpbuf_oversized function to check for oversized buffer. Checks were added for parse functions and error messages returned. Basic manual testing performed. Reviewed-by: Yifeng Sun <pkusunyifeng@gmail.com> Reported-by: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12972 Signed-off-by: Toms Atteka <cpp.code.lv@gmail.com> Signed-off-by: Ben Pfaff <blp@ovn.org>
Diffstat (limited to 'lib/ofp-actions.c')
-rw-r--r--lib/ofp-actions.c29
1 files changed, 29 insertions, 0 deletions
diff --git a/lib/ofp-actions.c b/lib/ofp-actions.c
index e8e88aca4..1340614ec 100644
--- a/lib/ofp-actions.c
+++ b/lib/ofp-actions.c
@@ -989,6 +989,11 @@ parse_CONTROLLER(char *arg, const struct ofpact_parse_params *pp)
controller = pp->ofpacts->header;
controller->userdata_len = userdata_len;
}
+
+ if (ofpbuf_oversized(pp->ofpacts)) {
+ return xasprintf("input too big");
+ }
+
ofpact_finish_CONTROLLER(pp->ofpacts, &controller);
}
@@ -3690,6 +3695,11 @@ parse_DEC_TTL(char *arg, const struct ofpact_parse_params *pp)
return xstrdup("dec_ttl_cnt_ids: expected at least one controller "
"id.");
}
+
+ if (ofpbuf_oversized(pp->ofpacts)) {
+ return xasprintf("input too big");
+ }
+
ofpact_finish_DEC_TTL(pp->ofpacts, &ids);
}
return NULL;
@@ -4443,6 +4453,11 @@ parse_ENCAP(char *arg, const struct ofpact_parse_params *pp)
/* ofpbuf may have been re-allocated. */
encap = pp->ofpacts->header;
encap->n_props = n_props;
+
+ if (ofpbuf_oversized(pp->ofpacts)) {
+ return xasprintf("input too big");
+ }
+
ofpact_finish_ENCAP(pp->ofpacts, &encap);
return NULL;
}
@@ -5772,6 +5787,11 @@ parse_NOTE(const char *arg, const struct ofpact_parse_params *pp)
struct ofpact_note *note = ofpbuf_at_assert(pp->ofpacts, start_ofs,
sizeof *note);
note->length = pp->ofpacts->size - (start_ofs + sizeof *note);
+
+ if (ofpbuf_oversized(pp->ofpacts)) {
+ return xasprintf("input too big");
+ }
+
ofpact_finish_NOTE(pp->ofpacts, &note);
return NULL;
}
@@ -5929,6 +5949,10 @@ parse_CLONE(char *arg, const struct ofpact_parse_params *pp)
pp->ofpacts->header = ofpbuf_push_uninit(pp->ofpacts, sizeof *clone);
clone = pp->ofpacts->header;
+ if (ofpbuf_oversized(pp->ofpacts)) {
+ return xasprintf("input too big");
+ }
+
ofpact_finish_CLONE(pp->ofpacts, &clone);
ofpbuf_push_uninit(pp->ofpacts, clone_offset);
return error;
@@ -6615,6 +6639,11 @@ parse_CT(char *arg, const struct ofpact_parse_params *pp)
if (!error && oc->flags & NX_CT_F_FORCE && !(oc->flags & NX_CT_F_COMMIT)) {
error = xasprintf("\"force\" flag requires \"commit\" flag.");
}
+
+ if (ofpbuf_oversized(pp->ofpacts)) {
+ return xasprintf("input too big");
+ }
+
ofpact_finish_CT(pp->ofpacts, &oc);
ofpbuf_push_uninit(pp->ofpacts, ct_offset);
return error;