[Bug 258504] smbfs doesn't validate msg fields -> potential kernel page fault
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 258504] smbfs doesn't validate msg fields -> potential kernel page fault"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 258504] smbfs doesn't validate msg fields -> potential kernel page fault"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 258504] smbfs doesn't validate msg fields -> potential kernel page fault"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 258504] smbfs doesn't validate msg fields -> potential kernel page fault"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 258504] smbfs doesn't validate msg fields -> potential kernel page fault"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 14 Sep 2021 17:32:43 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=258504
Bug ID: 258504
Summary: smbfs doesn't validate msg fields -> potential kernel
page fault
Product: Base System
Version: CURRENT
Hardware: Any
OS: Any
Status: New
Severity: Affects Only Me
Priority: ---
Component: kern
Assignee: bugs@FreeBSD.org
Reporter: rtm@lcs.mit.edu
Attachment #227902 text/plain
mime type:
Created attachment 227902
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=227902&action=edit
demo to produce kernel page fault in smbfs code
If the smbfs kernel code receives a message from the server
that has too-large values for the parameter offset/length
or data offset/length, the kernel can page fault. The problem
is that smb_t2_reply() reads fields out of reply messages
and uses them to adjust mbuf fields without validating. Adding
these lines to the start of smb_t2_placedata() is one way to
improve this situation:
u_int ml = m_length(mtop, (struct mbuf **) 0);
if(offset + count > ml)
return 1;
I'm able to cause this crash in FreeBSD-RELEASE-p4 and last month's
CURRENT, on amd64.
I've attached a demonstration program. It expects samba to
be running on localhost, proxies a connection between smbfs
and samba, and sets the high bit of the parameter count field
of the 4th server message as it passes by. Here's the backtrace:
Fatal trap 12: page fault while in kernel mode
cpuid = 1; apic id = 01
fault virtual address = 0x18
fault code = supervisor write data, page not present
instruction pointer = 0x20:0xffffffff8271afcd
stack pointer = 0x0:0xfffffe00a41ad5c0
frame pointer = 0x0:0xfffffe00a41ad6d0
code segment = base 0x0, limit 0xfffff, type 0x1b
= DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags = interrupt enabled, resume, IOPL = 0
current process = 743 (mount_smbfs)
trap number = 12
panic: page fault
cpuid = 1
time = 1631627929
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe00a41ad260
vpanic() at vpanic+0x187/frame 0xfffffe00a41ad2c0
panic() at panic+0x43/frame 0xfffffe00a41ad320
trap_fatal() at trap_fatal+0x387/frame 0xfffffe00a41ad380
trap_pfault() at trap_pfault+0x99/frame 0xfffffe00a41ad3e0
trap() at trap+0x2a7/frame 0xfffffe00a41ad4f0
calltrap() at calltrap+0x8/frame 0xfffffe00a41ad4f0
--- trap 0xc, rip = 0xffffffff8271afcd, rsp = 0xfffffe00a41ad5c0, rbp =
0xfffffe00a41ad6d0 ---
smb_t2_request() at smb_t2_request+0x83d/frame 0xfffffe00a41ad6d0
smbfs_smb_statfs() at smbfs_smb_statfs+0x76/frame 0xfffffe00a41ad740
smbfs_statfs() at smbfs_statfs+0x61/frame 0xfffffe00a41ad770
vfs_domount() at vfs_domount+0xa53/frame 0xfffffe00a41ad9e0
vfs_donmount() at vfs_donmount+0x880/frame 0xfffffe00a41ada80
sys_nmount() at sys_nmount+0x69/frame 0xfffffe00a41adac0
amd64_syscall() at amd64_syscall+0x12e/frame 0xfffffe00a41adbf0
fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe00a41adbf0
--- syscall (378, FreeBSD ELF64, sys_nmount), rip = 0x8011b7afa, rsp =
0x7fffffffe388, rbp = 0x7fffffffe9d0 ---
KDB: enter: panic
[ thread pid 743 tid 100111 ]
Stopped at kdb_enter+0x37: movq $0,0x127ae9e(%rip)
db>
This is on FreeBSD xxx 14.0-CURRENT FreeBSD 14.0-CURRENT #0
main-n248636-d20e9e02db3: Thu Aug 12 05:47:18 UTC 2021
root@releng1.nyi.freebsd.org:/usr/obj/usr/src/amd64.amd64/sys/GENERIC amd64
--
You are receiving this mail because:
You are the assignee for the bug.