Android: OOB write in ssp_batch_ioctl
SensorHub exposes a character device under /dev/batch_io which can be used in order to send instructions to batches of running sensors.
The IOCTL handler from this device has the following high-level logic:
1. static long ssp_batch_ioctl(struct file *file, unsigned int cmd, unsigned long arg) {
2. struct ssp_data *data = container_of(file->private_data, struct ssp_data, batch_io_device);
3. <...SNIP...>
4. sensor_type = (cmd & 0xFF);
5. if ((cmd >> 8 & 0xFF) != BATCH_IOCTL_MAGIC) {
6. pr_err("[SSP] Invalid BATCH CMD %x", cmd);
7. return -EINVAL;
8. }
9. <...SNIP...>
10. if (ret > 0) {
11. data->batchOptBuf[sensor_type] = (u8)batch.flag;
12. data->batchLatencyBuf[sensor_type] = timeout_ms;
13. data->adDelayBuf[sensor_type] = batch.delay;
14. } else {
15. ret = send_instruction_sync(data, CHANGE_DELAY, sensor_type, uBuf, 9);
16. if (ret > 0) {
17. data->batchOptBuf[sensor_type] = (u8)batch.flag;
18. data->batchLatencyBuf[sensor_type] = timeout_ms;
19. data->adDelayBuf[sensor_type] = batch.delay;
20. }
21. ...
As seen in the code above, the "sensor_type" field is taken from the least-significant byte of the user-supplied "cmd" argument. The range of the sensor_type is not validated in any way before using it (lines 11-19) as an index into a number of arrays defined under the "ssp_data" structure.
Looking at the definition of the "ssp_data" structure shows that the underlying arrays are defined as follows:
struct ssp_data {
...
int64_t adDelayBuf[SENSOR_MAX];
u64 lastTimestamp[SENSOR_MAX];
s32 batchLatencyBuf[SENSOR_MAX];
s8 batchOptBuf[SENSOR_MAX];
...
int (*wakeup_mcu)(void);
int (*set_mcu_reset)(int);
void (*get_sensor_data[SENSOR_MAX])(char *, int *, struct sensor_value *);
void (*report_sensor_data[SENSOR_MAX])(struct ssp_data *, struct sensor_value *);
...
}
The value of SENSOR_MAX varies according to the sensor vendor. For Broadcom, SENSOR_MAX is defined as 30, for Atmel 21, and for STM 25. Regardless, as the user-supplied "sensor_type" argument is not validated in any way, its range is 0x00-0xFF, thus exceeding the dimensions of the arrays above.
An attacker may use this vulnerability in order to overwrite values in the "ssp_data" structure which reside after the aforementioned arrays. For example, there are a few function pointers (see above) which the attacker could hijack. Moreover, note that the flow leading to the memory corruption is fully attacker-controlled, as is some of the data written (e.g., batch.flag or batch.delay).
This issue can be addressed by verifying the range of the "sensor_type" field to make sure it doesn't exceed SENSOR_MAX.
I've statically verified this issue on an SM-G935F device. The open-source kernel package I analysed was "SM-G935F_MM_Opensource".
The device entry mentioned above is owned by UID/GID "system". The SELinux context for this device is: "u:object_r:io_device:s0".
According to the default SELinux rules as present on the SM-G935F (version XXS1APG3), the following contexts may access this device file:
allow system_server io_device : chr_file { ioctl read open } ;
This bug is subject to a 90 day disclosure deadline. If 90 days elapse
without a broadly available patch, then the bug report will automatically
become visible to the public.
Found by: laginimaineb