Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rust: Query for uncontrolled allocation size #19171

Open
wants to merge 16 commits into
base: main
Choose a base branch
from

Conversation

geoffw0
Copy link
Contributor

@geoffw0 geoffw0 commented Mar 31, 2025

New query rust/uncontrolled-allocation-size for uncontrolled allocations, that is, where user input is allowed to control the size of a memory allocation with no guard.

Note that there's a related issue when a size calculation can overflow, possibly leading to an under-allocation and consequent buffer overrun. The worst (but not uncommon) case is when these two issues coincide, giving an attacker the ability to control the buffer overrun. We probably want another query for overflowing arithmetic at some point to get good overall coverage.

TODO:

  • code review
  • docs review
  • DCA run

@geoffw0 geoffw0 added the Rust Pull requests that update Rust code label Mar 31, 2025
@Copilot Copilot bot review requested due to automatic review settings March 31, 2025 17:29
Copy link
Contributor

github-actions bot commented Mar 31, 2025

QHelp previews:

rust/ql/src/queries/security/CWE-770/UncontrolledAllocationSize.qhelp

Uncontrolled allocation size

Allocating memory with a size based on user input may allow arbitrary amounts of memory to be allocated, leading to a crash or denial of service incident.

If the user input is multiplied by a constant, such as the size of a type, the result may overflow. In a build with the --release flag Rust performs two's complement wrapping, with the result that less memory may be allocated than expected. This can lead to buffer overflow incidents.

Recommendation

Implement a guard to limit the amount of memory that is allocated, and reject the request if the guard is not met. Ensure that any multiplications in the calculation cannot overflow, either by guarding their inputs, or using a multiplication routine such as checked_mul that does not wrap around.

Example

In the following example, an arbitrary amount of memory is allocated based on user input. In addition, due to the multiplication operation the result may overflow if a very large value is provided, leading to less memory being allocated than other parts of the program expect.

fn allocate_buffer(user_input: String) -> Result<*mut u8, Error> {
    let num_bytes = user_input.parse::<usize>()? * std::mem::size_of::<u64>();

    let layout = std::alloc::Layout::from_size_align(num_bytes, 1).unwrap();
    unsafe {
        let buffer = std::alloc::alloc(layout); // BAD: uncontrolled allocation size

        Ok(buffer)
    }
}

In the fixed example, the user input is checked against a maximum value. If the check fails an error is returned, and both the multiplication and alloaction do not take place.

const BUFFER_LIMIT: usize = 10 * 1024;

fn allocate_buffer(user_input: String) -> Result<*mut u8, Error> {
    let size = user_input.parse::<usize>()?;
    if size > BUFFER_LIMIT {
        return Err("Size exceeds limit".into());
    }
    let num_bytes = size * std::mem::size_of::<u64>();

    let layout = std::alloc::Layout::from_size_align(num_bytes, 1).unwrap();
    unsafe {
        let buffer = std::alloc::alloc(layout); // GOOD

        Ok(buffer)
    }
}

References

Copy link
Contributor

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This pull request introduces a new query for detecting uncontrolled allocation sizes in Rust and adds corresponding test cases and model adjustments. Key changes include adding new test cases under CWE-770, implementing example queries for both good and bad allocation practices, and extending the CodeQL model definitions for allocation functions.

Reviewed Changes

Copilot reviewed 9 out of 15 changed files in this pull request and generated 5 comments.

Show a summary per file
File Description
rust/ql/test/query-tests/security/CWE-770/rust-toolchain.toml Updates toolchain configuration for Rust tests
rust/ql/test/query-tests/security/CWE-770/options.yml Adds dependency and cargo check options
rust/ql/test/query-tests/security/CWE-770/main.rs Adds extensive test cases for uncontrolled allocation size scenarios
rust/ql/src/queries/security/CWE-770/UncontrolledAllocationSizeGood.rs Provides a safe allocation example with proper bounds checking
rust/ql/src/queries/security/CWE-770/UncontrolledAllocationSizeBad.rs Provides an unsafe allocation example without guards
rust/ql/lib/codeql/rust/frameworks/stdlib/lang-core.model.yml
rust/ql/lib/codeql/rust/frameworks/stdlib/lang-alloc.model.yml
rust/ql/lib/codeql/rust/frameworks/libc.model.yml
Updates and adds model entries pertaining to allocation functions
Files not reviewed (6)
  • rust/ql/lib/codeql/rust/security/UncontrolledAllocationSizeExtensions.qll: Language not supported
  • rust/ql/src/queries/security/CWE-770/UncontrolledAllocationSize.qhelp: Language not supported
  • rust/ql/src/queries/security/CWE-770/UncontrolledAllocationSize.ql: Language not supported
  • rust/ql/src/queries/summary/Stats.qll: Language not supported
  • rust/ql/test/query-tests/diagnostics/SummaryStats.expected: Language not supported
  • rust/ql/test/query-tests/security/CWE-770/UncontrolledAllocationSize.qlref: Language not supported

Tip: Copilot code review supports C#, Go, Java, JavaScript, Markdown, Python, Ruby and TypeScript, with more languages coming soon. Learn more

Comment on lines +40 to +44
from UncontrolledAllocationFlow::PathNode source, UncontrolledAllocationFlow::PathNode sink
where UncontrolledAllocationFlow::flowPath(source, sink)
select sink.getNode(), source, sink,
"This allocation size is derived from a $@ and could allocate arbitrary amounts of memory.",
source.getNode(), "user-provided value"

Check warning

Code scanning / CodeQL

Consistent alert message Warning

The rust/uncontrolled-allocation-size query does not have the same alert message as go.
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, it's almost identical to the CPP version though.

@paldepind paldepind self-assigned this Apr 1, 2025
Copy link
Contributor

@paldepind paldepind left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks great. I few comments and questions.

I wonder if it would also make sense to model Vec::with_capacity as a sink? That is higher level, so it might be used more out there.

* if the overall expression evaluates to `true`; for example on
* `x <= 20` this is the `20`, and on `y > 0` it is `y`.
*/
private Expr getGreaterOperand(BinaryExpr op) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If these could potentially be useful in other queries we could add them as member predicates to BinaryExpr?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes I have plans to do that, but I think we should add a ComparisonOperation class and possibly clean up the existing BinaryExpr hierarchy. So it deserves a PR of its own.

* A sink for uncontrolled allocation size from model data.
*/
private class ModelsAsDataSink extends Sink {
ModelsAsDataSink() { sinkNode(this, ["alloc-size", "alloc-layout"]) }
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What is the difference between alloc-size and alloc-layout?

Copy link
Contributor Author

@geoffw0 geoffw0 Apr 4, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

alloc-size is an integer that controls the size of an allocation, whereas alloc-layout is a Layout that controls an allocation. A Layout is basically a glorified (size, alignment) pair, the result of a call such as std::alloc::Layout::array::<u32>(v).

The current design has taint flow through Layout constructors, with sinks where the allocation is actually made. The query doesn't care which kind of sink, but I figured it might be better to tag them separately in case some future query does care about the difference (perhaps because it cares about alignments rather than sizes???).

An alternative and slightly simpler design would be to have an alloc-size sink directly in the Layout constructors, rather than a summary, and drop the alloc-layout sinks (effectively assuming that you would only create a Layout because you intend to do an allocation).

Another alternative design would be to have taint/data flow to the size field of the Layout and have alloc-size sinks on the size field of the allocations that use a layout.

@geoffw0
Copy link
Contributor Author

geoffw0 commented Apr 4, 2025

I wonder if it would also make sense to model Vec::with_capacity as a sink?

Yes I think it does make sense, and there are a bunch of other container class methods that might have similar properties. My (optimistic) hope is that auto-modelling can fill in the gaps, and the test cases for vec here will serve as a confirmation of that (not comprehensive coverage).

@geoffw0 geoffw0 added the ready-for-doc-review This PR requires and is ready for review from the GitHub docs team. label Apr 4, 2025
@geoffw0
Copy link
Contributor Author

geoffw0 commented Apr 4, 2025

DCA LGTM, a bit uneventful, it looks like we're not finding many sinks for this initial version of the query.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation ready-for-doc-review This PR requires and is ready for review from the GitHub docs team. Rust Pull requests that update Rust code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants