Page MenuHomeFreeBSD

ipfilter: Plug ip_htable kernel information leak
ClosedPublic

Authored by cy on Wed, Oct 22, 11:26 PM.
Tags
None
Referenced Files
Unknown Object (File)
Fri, Oct 24, 10:31 PM
Unknown Object (File)
Fri, Oct 24, 5:48 PM
Unknown Object (File)
Fri, Oct 24, 5:48 PM
Unknown Object (File)
Fri, Oct 24, 5:48 PM
Unknown Object (File)
Fri, Oct 24, 9:28 AM
Unknown Object (File)
Thu, Oct 23, 3:51 PM
Unknown Object (File)
Thu, Oct 23, 3:47 PM
Unknown Object (File)
Thu, Oct 23, 11:25 AM

Details

Summary

ipf_htable_stats_get() constructs an iphtstat_t on the stack and only
initializes select fields before copying the entire structure to
userland. The trailing padding array iphs_pad[16] is never initialized,
so ~128 bytes of uninitialized kernel stack memory can be leaked to user
space on each call. This is a classic information disclosure
vulnerability that can reveal pointers and other sensitive data.

We fix this by zeroing out the data structure prior to use.

Reported by: Ilja Van Sprundel <ivansprundel@ioactive.com>
MFC after: 1 day

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

cy requested review of this revision.Wed, Oct 22, 11:26 PM
This revision is now accepted and ready to land.Wed, Oct 22, 11:55 PM

If you haven't tried testing ipf with the GENERIC-KMSAN kernel config, I suggest it: it'll automatically catch bugs of this kind. kmsan.9 has some details.

cy retitled this revision from ipfilter: Plug kernel information leak to ipfilter: Plug ip_htable kernel information leak.Thu, Oct 23, 3:21 PM

If you haven't tried testing ipf with the GENERIC-KMSAN kernel config, I suggest it: it'll automatically catch bugs of this kind. kmsan.9 has some details.

I'm half way through creating patches. The reviews I've submitted have been fixed to build. I'll build a KMSAN kernel for the testbed and try the patches I do have here this afternoon.

This revision was automatically updated to reflect the committed changes.