Page MenuHomeFreeBSD

Fix buffer overread in preloaded hostuuid parsing
ClosedPublic

Authored by jrtc27 on Dec 22 2021, 4:10 PM.
Tags
None
Referenced Files
Unknown Object (File)
Sun, Feb 8, 12:30 PM
Unknown Object (File)
Sun, Feb 8, 12:05 AM
Unknown Object (File)
Mon, Feb 2, 6:15 AM
Unknown Object (File)
Sat, Jan 31, 12:50 PM
Unknown Object (File)
Jan 23 2026, 7:36 AM
Unknown Object (File)
Jan 23 2026, 3:04 AM
Unknown Object (File)
Jan 23 2026, 2:56 AM
Unknown Object (File)
Jan 22 2026, 3:02 PM
Subscribers

Details

Summary

Commit b6be9566d236 stopped prison0_init writing outside of the
preloaded hostuuid's bounds. However, the preloaded data will not
(normally) have a NUL in it, and so validate_uuid will walk off the end
of the buffer in its call to sscanf. Previously if there was any
whitespace in the string we'd at least know there's a NUL one past the
end due to the off-by-one error, but now no such byte is guaranteed.

Fix this by copying to a temporary buffer and explicitly adding a NUL.

Whilst here, change the strlcpy call to use a far less suspicious
argument for dstsize; in practice it's fine, but it's an unusual pattern
and not necessary.

Found by: CHERI
MFC after: 1 week

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable