Page MenuHomeFreeBSD

ipfilter: Plug ip_htable kernel information leak
ClosedPublic

Authored by cy on Oct 22 2025, 11:26 PM.
Tags
None
Referenced Files
Unknown Object (File)
Mon, Nov 17, 9:43 PM
Unknown Object (File)
Sun, Nov 16, 3:22 AM
Unknown Object (File)
Sun, Nov 16, 3:13 AM
Unknown Object (File)
Sun, Nov 9, 4:29 PM
Unknown Object (File)
Fri, Nov 7, 6:48 PM
Unknown Object (File)
Thu, Nov 6, 4:45 PM
Unknown Object (File)
Wed, Oct 29, 1:40 PM
Unknown Object (File)
Wed, Oct 29, 12:04 PM

Details

Summary

ipf_htable_stats_get() constructs an iphtstat_t on the stack and only
initializes select fields before copying the entire structure to
userland. The trailing padding array iphs_pad[16] is never initialized,
so ~128 bytes of uninitialized kernel stack memory can be leaked to user
space on each call. This is a classic information disclosure
vulnerability that can reveal pointers and other sensitive data.

We fix this by zeroing out the data structure prior to use.

Reported by: Ilja Van Sprundel <ivansprundel@ioactive.com>
MFC after: 1 day

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

cy requested review of this revision.Oct 22 2025, 11:26 PM
This revision is now accepted and ready to land.Oct 22 2025, 11:55 PM

If you haven't tried testing ipf with the GENERIC-KMSAN kernel config, I suggest it: it'll automatically catch bugs of this kind. kmsan.9 has some details.

cy retitled this revision from ipfilter: Plug kernel information leak to ipfilter: Plug ip_htable kernel information leak.Oct 23 2025, 3:21 PM

If you haven't tried testing ipf with the GENERIC-KMSAN kernel config, I suggest it: it'll automatically catch bugs of this kind. kmsan.9 has some details.

I'm half way through creating patches. The reviews I've submitted have been fixed to build. I'll build a KMSAN kernel for the testbed and try the patches I do have here this afternoon.

This revision was automatically updated to reflect the committed changes.