Page MenuHomeFreeBSD

ipfilter: Plug ip_htable kernel information leak
ClosedPublic

Authored by cy on Oct 22 2025, 11:26 PM.
Tags
None
Referenced Files
Unknown Object (File)
Thu, Dec 18, 8:40 AM
Unknown Object (File)
Wed, Dec 10, 1:34 PM
Unknown Object (File)
Fri, Dec 5, 12:16 PM
Unknown Object (File)
Fri, Nov 28, 5:36 PM
Unknown Object (File)
Nov 17 2025, 9:43 PM
Unknown Object (File)
Nov 16 2025, 3:22 AM
Unknown Object (File)
Nov 16 2025, 3:13 AM
Unknown Object (File)
Nov 9 2025, 4:29 PM

Details

Summary

ipf_htable_stats_get() constructs an iphtstat_t on the stack and only
initializes select fields before copying the entire structure to
userland. The trailing padding array iphs_pad[16] is never initialized,
so ~128 bytes of uninitialized kernel stack memory can be leaked to user
space on each call. This is a classic information disclosure
vulnerability that can reveal pointers and other sensitive data.

We fix this by zeroing out the data structure prior to use.

Reported by: Ilja Van Sprundel <ivansprundel@ioactive.com>
MFC after: 1 day

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

cy requested review of this revision.Oct 22 2025, 11:26 PM
This revision is now accepted and ready to land.Oct 22 2025, 11:55 PM

If you haven't tried testing ipf with the GENERIC-KMSAN kernel config, I suggest it: it'll automatically catch bugs of this kind. kmsan.9 has some details.

cy retitled this revision from ipfilter: Plug kernel information leak to ipfilter: Plug ip_htable kernel information leak.Oct 23 2025, 3:21 PM

If you haven't tried testing ipf with the GENERIC-KMSAN kernel config, I suggest it: it'll automatically catch bugs of this kind. kmsan.9 has some details.

I'm half way through creating patches. The reviews I've submitted have been fixed to build. I'll build a KMSAN kernel for the testbed and try the patches I do have here this afternoon.

This revision was automatically updated to reflect the committed changes.