Page MenuHomeFreeBSD

Fix buffer overread in preloaded hostuuid parsing
ClosedPublic

Authored by jrtc27 on Dec 22 2021, 4:10 PM.
Tags
None
Referenced Files
Unknown Object (File)
Sep 21 2024, 3:21 AM
Unknown Object (File)
Sep 20 2024, 1:58 AM
Unknown Object (File)
Sep 19 2024, 12:58 PM
Unknown Object (File)
Sep 18 2024, 7:00 PM
Unknown Object (File)
Sep 15 2024, 10:02 PM
Unknown Object (File)
Sep 11 2024, 12:13 AM
Unknown Object (File)
Sep 6 2024, 1:30 AM
Unknown Object (File)
Aug 31 2024, 9:03 PM
Subscribers

Details

Summary

Commit b6be9566d236 stopped prison0_init writing outside of the
preloaded hostuuid's bounds. However, the preloaded data will not
(normally) have a NUL in it, and so validate_uuid will walk off the end
of the buffer in its call to sscanf. Previously if there was any
whitespace in the string we'd at least know there's a NUL one past the
end due to the off-by-one error, but now no such byte is guaranteed.

Fix this by copying to a temporary buffer and explicitly adding a NUL.

Whilst here, change the strlcpy call to use a far less suspicious
argument for dstsize; in practice it's fine, but it's an unusual pattern
and not necessary.

Found by: CHERI
MFC after: 1 week

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable