If xstrtol() was being called with a base of 1, under some conditions it
would invoke Undefined Behavior.

Here's the code that would trigger UB:

        char  *end;

        xstrtol(str, &end, 1, ...);  // Let's ignore trailing args.

The reason why this triggers UB is that since the following line lets a
base of 1 go through:

        assure (0 <= strtol_base && strtol_base <= 36);

then we arrive at this call:

        tmp = __strtol (s, p, strtol_base);

which sets errno to EINVAL and returns 0 immediately, without updating
the 'p' pointer.  Then, the following line of code:

        if (*p == s)

dereferences an uninitialized pointer.

This was found while searching for examples of why strtol(3) is a bad
API, and how it makes it so easy to misuse.

Fixes: 034a18049cbc (2014-12-20, "assure: new module")
Link: 
<https://github.com/void-linux/void-packages/issues/51261#issuecomment-2237013621>
Cc: Paul Eggert <egg...@cs.ucla.edu>
Cc: Đoàn Trần Công Danh <congdan...@gmail.com>
Cc: Eli Schwartz <eschwart...@gmail.com>
Cc: Sam James <s...@gentoo.org>
Cc: Serge Hallyn <se...@hallyn.com>
Cc: Iker Pedrosa <ipedr...@redhat.com>
Cc: "Andrew J. Hesford" <a...@sideband.org>
Cc: Michael Vetter <jub...@iodoru.org>
Cc: <lib...@lists.linux.dev>
Signed-off-by: Alejandro Colomar <a...@kernel.org>
---
Range-diff against v0:
-:  ---------- > 1:  49c4c25b0a xstrtol: 1 is not a valid base

 lib/xstrtol.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/lib/xstrtol.c b/lib/xstrtol.c
index e4bce43681..575c16d45f 100644
--- a/lib/xstrtol.c
+++ b/lib/xstrtol.c
@@ -83,7 +83,7 @@ __xstrtol (const char *s, char **ptr, int strtol_base,
   __strtol_t tmp;
   strtol_error err = LONGINT_OK;
 
-  assure (0 <= strtol_base && strtol_base <= 36);
+  assure (0 == strtol_base || (2 <= strtol_base && strtol_base <= 36));
 
   p = (ptr ? ptr : &t_ptr);
 
-- 
2.45.2

Attachment: signature.asc
Description: PGP signature

Reply via email to