Error: INTEGER_OVERFLOW (CWE-190): [#def1] [important] bluez-5.77/mesh/net.c:3164:4: cast_overflow: Truncation due to cast operation on "msg->len - seg_off" from 32 to 8 bits. bluez-5.77/mesh/net.c:3164:4: overflow_assign: "seg_len" is assigned from "msg->len - seg_off". bluez-5.77/mesh/net.c:3178:2: overflow_sink: "seg_len", which might have overflowed, is passed to "mesh_crypto_packet_build(false, msg->ttl, seq_num, msg->src, msg->remote, 0, msg->segmented, msg->key_aid, msg->szmic, false, msg->seqZero, segO, segN, msg->buf + seg_off, seg_len, packet + 1, &packet_len)". 3176| 3177| /* TODO: Are we RXing on an LPN's behalf? Then set RLY bit */ 3178|-> if (!mesh_crypto_packet_build(false, msg->ttl, seq_num, msg->src, 3179| msg->remote, 0, msg->segmented, 3180| msg->key_aid, msg->szmic, false, X --- mesh/net.c | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-) diff --git a/mesh/net.c b/mesh/net.c index 05ca48326fc5..ef6a3133859a 100644 --- a/mesh/net.c +++ b/mesh/net.c @@ -3149,13 +3149,22 @@ static bool send_seg(struct mesh_net *net, uint8_t cnt, uint16_t interval, uint32_t seq_num; if (msg->segmented) { + if (msg->len < seg_off) { + l_error("Failed to build packet"); + return false; + } /* Send each segment on unique seq_num */ seq_num = mesh_net_next_seq_num(net); - if (msg->len - seg_off > SEG_OFF(1)) + if (msg->len - seg_off > SEG_OFF(1)) { seg_len = SEG_OFF(1); - else + } else { + if (msg->len - seg_off > UINT8_MAX) { + l_error("Failed to build packet"); + return false; + } seg_len = msg->len - seg_off; + } } else { /* Send on same seq_num used for Access Layer */ seq_num = msg->seqAuth; -- 2.45.2