Page MenuHomeFreeBSD

ipfilter: Plug ip_htable kernel information leak
ClosedPublic

Authored by cy on Oct 22 2025, 11:26 PM.
Tags
None
Referenced Files
F152491293: D53275.id164813.diff
Wed, Apr 15, 7:23 AM
Unknown Object (File)
Sun, Apr 12, 7:45 AM
Unknown Object (File)
Tue, Apr 7, 6:42 AM
Unknown Object (File)
Sat, Mar 21, 6:38 PM
Unknown Object (File)
Sat, Mar 21, 11:59 AM
Unknown Object (File)
Sat, Mar 21, 3:48 AM
Unknown Object (File)
Mar 14 2026, 7:29 PM
Unknown Object (File)
Mar 8 2026, 9:05 PM

Details

Summary

ipf_htable_stats_get() constructs an iphtstat_t on the stack and only
initializes select fields before copying the entire structure to
userland. The trailing padding array iphs_pad[16] is never initialized,
so ~128 bytes of uninitialized kernel stack memory can be leaked to user
space on each call. This is a classic information disclosure
vulnerability that can reveal pointers and other sensitive data.

We fix this by zeroing out the data structure prior to use.

Reported by: Ilja Van Sprundel <ivansprundel@ioactive.com>
MFC after: 1 day

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

cy requested review of this revision.Oct 22 2025, 11:26 PM
This revision is now accepted and ready to land.Oct 22 2025, 11:55 PM

If you haven't tried testing ipf with the GENERIC-KMSAN kernel config, I suggest it: it'll automatically catch bugs of this kind. kmsan.9 has some details.

cy retitled this revision from ipfilter: Plug kernel information leak to ipfilter: Plug ip_htable kernel information leak.Oct 23 2025, 3:21 PM

If you haven't tried testing ipf with the GENERIC-KMSAN kernel config, I suggest it: it'll automatically catch bugs of this kind. kmsan.9 has some details.

I'm half way through creating patches. The reviews I've submitted have been fixed to build. I'll build a KMSAN kernel for the testbed and try the patches I do have here this afternoon.

This revision was automatically updated to reflect the committed changes.