RT-Thread Version
master, verified on current worktree at commit 25295501c0cc7181d6a541a867fdf7214879ddf8
Hardware Type/Architectures
Any BSP using DFS v1 9PFS with an untrusted 9P transport/peer
Develop Toolchain
GCC
Describe the bug
Summary
A 9PFS client-side parsing vulnerability exists in RT-Thread DFS v1 9PFS.
RT-Thread's 9PFS client receives the actual reply size from the transport layer in p9_transaction(), but later parsing code such as dfs_9pfs_getdents() ignores that received size and instead trusts server-controlled fields embedded in the reply body, including count, stat_size, and name_len.
As a result, a malicious 9P server can return a short or malformed reply whose internal size fields cause the client to read beyond the received message buffer while parsing directory entries.
The most realistic impact is denial of service (crash / fault) in the 9PFS client. Depending on memory layout, the client may also copy out-of-bounds data into returned dirent entries and expose unintended memory contents to local callers.
Affected Components
components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.c
components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.h
components/libc/compilers/common/include/dirent.h
Key Evidence
1. Actual reply length is discarded by callers
p9_transaction() receives the transport-reported reply length:
components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.c:179
components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.h:132
But callers such as dfs_9pfs_read() and dfs_9pfs_getdents() pass RT_NULL for out_rx_size, so the actual received length is discarded.
2. Field access helpers have no bounds checking
components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.c:48
get_rx_value16_of() / get_rx_value32_of() directly read from conn->rx_buffer[idx] by offset without any bounds validation.
3. dfs_9pfs_getdents() trusts server-controlled lengths
Relevant locations:
components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.c:815
components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.c:846
components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.c:854
components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.c:880
components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.c:882
The function uses:
ret = get_rx_value32_of(conn, P9_MSG_READ_COUNT);
stat_size = get_rx_value16_of(conn, off + P9_MSG_STAT_SIZE) + sizeof(rt_uint16_t);
dirp->d_namlen = get_rx_value16_of(conn, off + P9_MSG_STAT_NAME_LEN);
rt_strncpy(dirp->d_name, conn->rx_buffer + off + P9_MSG_STAT_NAME, dirp->d_namlen);
But it does not verify that:
ret <= actual_rx_size - P9_MSG_READ_DATA
off + P9_MSG_STAT_SIZE + 2 <= actual_rx_size
stat_size <= remaining returned data
off + P9_MSG_STAT_NAME + d_namlen <= actual_rx_size
4. getdents() is worse than read()
dfs_9pfs_read() is still problematic because it ignores the actual reply size, but got is at least constrained by got <= set, and set <= conn->msg_size - P9_MSG_READ_DATA.
dfs_9pfs_getdents() is worse because ret, stat_size, and name_len are all trusted and off keeps increasing based on unvalidated values.
5. Primary issue is source-buffer over-read, not a local dirent destination overflow
components/libc/compilers/common/include/dirent.h:57
d_namlen is uint8_t and d_name is 256 bytes, so the more credible issue is reading past the received 9P reply buffer and then copying that data into the returned dirent.
Impact
If a system mounts an untrusted 9P peer, the peer can send malformed directory reply data that drives the client into out-of-bounds reads while parsing directory entries.
Practical impact:
- Client crash / fault / denial of service
- Undefined behavior during directory enumeration
- Possible copying of out-of-bounds data into returned
dirent structures, which may leak unintended memory contents to local callers
Steps to Reproduce
A practical PoC requires a malicious or instrumented 9P server / transport peer.
- Build RT-Thread with DFS v1 9PFS enabled.
- Connect or mount a 9P peer that the attacker controls.
- Trigger a directory listing on the mounted 9P filesystem so that
dfs_9pfs_getdents() is used.
- Return a malformed
Rread reply where:
- The actual received packet is short, but
P9_MSG_READ_COUNT is set larger than the real reply payload, and/or
- The embedded stat record
size field is inflated, and/or
name_len points beyond the actual received message body.
- Observe that the RT-Thread client continues parsing using those server-controlled lengths and reads beyond the valid received reply data.
Expected Behavior
The 9PFS client should track the actual reply size returned by the transport and reject any response whose internal fields exceed that boundary.
In particular:
dfs_9pfs_getdents() should reject replies if ret exceeds the actual received payload size
- Each parsed
stat_size should be validated before advancing off
- Each
name_len should be validated against the remaining received message length before reading or copying the name
Actual Behavior
The 9PFS client ignores the transport-reported reply length in this parsing path and trusts internal reply fields from the server to drive further buffer reads.
This allows a malicious 9P server to induce out-of-bounds reads during directory entry parsing, likely causing a crash or other denial-of-service condition.
Suggested Fix
The fix should make reply parsing length-aware and reject malformed replies early.
At minimum:
- Propagate and use the actual
rx_size returned by p9_transaction() in all reply parsing paths
- Reject any
Rread where P9_MSG_READ_COUNT exceeds rx_size - P9_MSG_READ_DATA
- In
dfs_9pfs_getdents(), before each field access, validate that the corresponding offset is still within the actual received reply length
- Reject any record where:
stat_size is smaller than the fixed stat header
stat_size exceeds the remaining returned data
name_len extends past the received message boundary
- Stop using raw
get_rx_valueXX_of() on unvalidated offsets for attacker-controlled message bodies
Kindly let me know if you intend to request a CVE ID upon confirmation of the vulnerability.
Other additional context
No response
RT-Thread Version
master, verified on current worktree at commit
25295501c0cc7181d6a541a867fdf7214879ddf8Hardware Type/Architectures
Any BSP using DFS v1 9PFS with an untrusted 9P transport/peer
Develop Toolchain
GCC
Describe the bug
Summary
A 9PFS client-side parsing vulnerability exists in RT-Thread DFS v1 9PFS.
RT-Thread's 9PFS client receives the actual reply size from the transport layer in
p9_transaction(), but later parsing code such asdfs_9pfs_getdents()ignores that received size and instead trusts server-controlled fields embedded in the reply body, includingcount,stat_size, andname_len.As a result, a malicious 9P server can return a short or malformed reply whose internal size fields cause the client to read beyond the received message buffer while parsing directory entries.
The most realistic impact is denial of service (crash / fault) in the 9PFS client. Depending on memory layout, the client may also copy out-of-bounds data into returned
dirententries and expose unintended memory contents to local callers.Affected Components
components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.ccomponents/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.hcomponents/libc/compilers/common/include/dirent.hKey Evidence
1. Actual reply length is discarded by callers
p9_transaction()receives the transport-reported reply length:components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.c:179components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.h:132But callers such as
dfs_9pfs_read()anddfs_9pfs_getdents()passRT_NULLforout_rx_size, so the actual received length is discarded.2. Field access helpers have no bounds checking
components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.c:48get_rx_value16_of()/get_rx_value32_of()directly read fromconn->rx_buffer[idx]by offset without any bounds validation.3.
dfs_9pfs_getdents()trusts server-controlled lengthsRelevant locations:
components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.c:815components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.c:846components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.c:854components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.c:880components/dfs/dfs_v1/filesystems/9pfs/dfs_9pfs.c:882The function uses:
But it does not verify that:
ret <= actual_rx_size - P9_MSG_READ_DATAoff + P9_MSG_STAT_SIZE + 2 <= actual_rx_sizestat_size <= remaining returned dataoff + P9_MSG_STAT_NAME + d_namlen <= actual_rx_size4.
getdents()is worse thanread()dfs_9pfs_read()is still problematic because it ignores the actual reply size, butgotis at least constrained bygot <= set, andset <= conn->msg_size - P9_MSG_READ_DATA.dfs_9pfs_getdents()is worse becauseret,stat_size, andname_lenare all trusted andoffkeeps increasing based on unvalidated values.5. Primary issue is source-buffer over-read, not a local
direntdestination overflowcomponents/libc/compilers/common/include/dirent.h:57d_namlenisuint8_tandd_nameis 256 bytes, so the more credible issue is reading past the received 9P reply buffer and then copying that data into the returneddirent.Impact
If a system mounts an untrusted 9P peer, the peer can send malformed directory reply data that drives the client into out-of-bounds reads while parsing directory entries.
Practical impact:
direntstructures, which may leak unintended memory contents to local callersSteps to Reproduce
A practical PoC requires a malicious or instrumented 9P server / transport peer.
dfs_9pfs_getdents()is used.Rreadreply where:P9_MSG_READ_COUNTis set larger than the real reply payload, and/orsizefield is inflated, and/orname_lenpoints beyond the actual received message body.Expected Behavior
The 9PFS client should track the actual reply size returned by the transport and reject any response whose internal fields exceed that boundary.
In particular:
dfs_9pfs_getdents()should reject replies ifretexceeds the actual received payload sizestat_sizeshould be validated before advancingoffname_lenshould be validated against the remaining received message length before reading or copying the nameActual Behavior
The 9PFS client ignores the transport-reported reply length in this parsing path and trusts internal reply fields from the server to drive further buffer reads.
This allows a malicious 9P server to induce out-of-bounds reads during directory entry parsing, likely causing a crash or other denial-of-service condition.
Suggested Fix
The fix should make reply parsing length-aware and reject malformed replies early.
At minimum:
rx_sizereturned byp9_transaction()in all reply parsing pathsRreadwhereP9_MSG_READ_COUNTexceedsrx_size - P9_MSG_READ_DATAdfs_9pfs_getdents(), before each field access, validate that the corresponding offset is still within the actual received reply lengthstat_sizeis smaller than the fixed stat headerstat_sizeexceeds the remaining returned dataname_lenextends past the received message boundaryget_rx_valueXX_of()on unvalidated offsets for attacker-controlled message bodiesKindly let me know if you intend to request a CVE ID upon confirmation of the vulnerability.
Other additional context
No response