ctl_ioctl() in cam/ctl/ctl.c says, under CTL_LUN_REQ: if (lun_req->args != NULL) { packed = malloc(lun_req->args_len, M_CTL, M_WAITOK); lun_req->args_len is supplied by the user program, with no sanity check. Some values will crash the kernel, e.g. 0xffffffffffffffff. A demo: int main() { int fd = open("/dev/cam/ctl", 2); if(fd < 0) { perror("/dev/cam/ctl"); exit(1); } char buf[512]; memset(buf, 0, sizeof(buf)); strcpy(buf, "block"); *(unsigned long long *)(buf + 32 + 14*8) = 0x8000000000000000ull; // args *(unsigned long long *)(buf + 32 + 16*8) = 0xffffffffffffffffull; // args_len ioctl(fd, 0xc168e121, buf); // CTL_LUN_REQ } panic: Assertion size > 0 failed at /usr/rtm/symbsd/src/sys/kern/subr_vmem.c:1332 panic() at panic+0x2a vmem_alloc() at vmem_alloc+0xc8 kmem_malloc_domain() at kmem_malloc_domain+0x54 kmem_malloc_domainset() at kmem_malloc_domainset+0x36 malloc_large() at malloc_large+0x2a malloc() at malloc+0xf8 ctl_ioctl() at ctl_ioctl+0x958 devfs_ioctl() at devfs_ioctl+0xbe VOP_IOCTL_APV() at VOP_IOCTL_APV+0x30 VOP_IOCTL() at VOP_IOCTL+0x36 vn_ioctl() at vn_ioctl+0xba devfs_ioctl_f() at devfs_ioctl_f+0x20 fo_ioctl() at fo_ioctl+0xa kern_ioctl() at kern_ioctl+0x242 sys_ioctl() at sys_ioctl+0x120 syscallenter() at syscallenter+0xec ecall_handler() at ecall_handler+0x18 do_trap_user() at do_trap_user+0xea cpu_exception_handler_user() at cpu_exception_handler_user+0x72
This device is available only to root user, so it is a form of foot shooting. But OK, I'll patch it.
(In reply to Alexander Motin from comment #1) Thanks Please make a note in the commit message about the device being available only to root (and hence not requiring an advisory).
A commit in branch main references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=0586be48a97c5af50ba4f578d33211f81cc57016 commit 0586be48a97c5af50ba4f578d33211f81cc57016 Author: Alexander Motin <mav@FreeBSD.org> AuthorDate: 2022-09-07 01:58:27 +0000 Commit: Alexander Motin <mav@FreeBSD.org> CommitDate: 2022-09-07 01:58:27 +0000 CTL: Validate IOCTL parameters. It was possible to cause kernel panic by passing too large args_len or non-NULL result_nvl. Though since the /dev/cam/ctl device is accessible only by root and used only by limited number of tools it was not a big problem. PR: 266115 PR: 266136 Reported by: Robert Morris <rtm@lcs.mit.edu> MFC after: 1 week sys/cam/ctl/ctl.c | 14 ++++++++++++++ sys/cam/ctl/ctl_ioctl.h | 1 + 2 files changed, 15 insertions(+)
A commit in branch stable/13 references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=c48d0754a05334cacbe6cd34871c10f3ef6f4d56 commit c48d0754a05334cacbe6cd34871c10f3ef6f4d56 Author: Alexander Motin <mav@FreeBSD.org> AuthorDate: 2022-09-07 01:58:27 +0000 Commit: Alexander Motin <mav@FreeBSD.org> CommitDate: 2022-09-14 17:27:04 +0000 CTL: Validate IOCTL parameters. It was possible to cause kernel panic by passing too large args_len or non-NULL result_nvl. Though since the /dev/cam/ctl device is accessible only by root and used only by limited number of tools it was not a big problem. PR: 266115 PR: 266136 Reported by: Robert Morris <rtm@lcs.mit.edu> MFC after: 1 week (cherry picked from commit 0586be48a97c5af50ba4f578d33211f81cc57016) sys/cam/ctl/ctl.c | 14 ++++++++++++++ sys/cam/ctl/ctl_ioctl.h | 1 + 2 files changed, 15 insertions(+)
A commit in branch stable/12 references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=ce1895b7248d5601b34d0d6492539a7081a8d451 commit ce1895b7248d5601b34d0d6492539a7081a8d451 Author: Alexander Motin <mav@FreeBSD.org> AuthorDate: 2022-09-07 01:58:27 +0000 Commit: Alexander Motin <mav@FreeBSD.org> CommitDate: 2022-09-14 17:28:18 +0000 CTL: Validate IOCTL parameters. It was possible to cause kernel panic by passing too large args_len or non-NULL result_nvl. Though since the /dev/cam/ctl device is accessible only by root and used only by limited number of tools it was not a big problem. PR: 266115 PR: 266136 Reported by: Robert Morris <rtm@lcs.mit.edu> MFC after: 1 week (cherry picked from commit 0586be48a97c5af50ba4f578d33211f81cc57016) sys/cam/ctl/ctl.c | 14 ++++++++++++++ sys/cam/ctl/ctl_ioctl.h | 1 + 2 files changed, 15 insertions(+)