-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rust: Query for uncontrolled allocation size #19171
base: main
Are you sure you want to change the base?
Conversation
QHelp previews: rust/ql/src/queries/security/CWE-770/UncontrolledAllocationSize.qhelpUncontrolled allocation sizeAllocating memory with a size based on user input may allow arbitrary amounts of memory to be allocated, leading to a crash or denial of service incident. If the user input is multiplied by a constant, such as the size of a type, the result may overflow. In a build with the RecommendationImplement a guard to limit the amount of memory that is allocated, and reject the request if the guard is not met. Ensure that any multiplications in the calculation cannot overflow, either by guarding their inputs, or using a multiplication routine such as ExampleIn the following example, an arbitrary amount of memory is allocated based on user input. In addition, due to the multiplication operation the result may overflow if a very large value is provided, leading to less memory being allocated than other parts of the program expect. fn allocate_buffer(user_input: String) -> Result<*mut u8, Error> {
let num_bytes = user_input.parse::<usize>()? * std::mem::size_of::<u64>();
let layout = std::alloc::Layout::from_size_align(num_bytes, 1).unwrap();
unsafe {
let buffer = std::alloc::alloc(layout); // BAD: uncontrolled allocation size
Ok(buffer)
}
} In the fixed example, the user input is checked against a maximum value. If the check fails an error is returned, and both the multiplication and alloaction do not take place. const BUFFER_LIMIT: usize = 10 * 1024;
fn allocate_buffer(user_input: String) -> Result<*mut u8, Error> {
let size = user_input.parse::<usize>()?;
if size > BUFFER_LIMIT {
return Err("Size exceeds limit".into());
}
let num_bytes = size * std::mem::size_of::<u64>();
let layout = std::alloc::Layout::from_size_align(num_bytes, 1).unwrap();
unsafe {
let buffer = std::alloc::alloc(layout); // GOOD
Ok(buffer)
}
} References
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This pull request introduces a new query for detecting uncontrolled allocation sizes in Rust and adds corresponding test cases and model adjustments. Key changes include adding new test cases under CWE-770, implementing example queries for both good and bad allocation practices, and extending the CodeQL model definitions for allocation functions.
Reviewed Changes
Copilot reviewed 9 out of 15 changed files in this pull request and generated 5 comments.
Show a summary per file
File | Description |
---|---|
rust/ql/test/query-tests/security/CWE-770/rust-toolchain.toml | Updates toolchain configuration for Rust tests |
rust/ql/test/query-tests/security/CWE-770/options.yml | Adds dependency and cargo check options |
rust/ql/test/query-tests/security/CWE-770/main.rs | Adds extensive test cases for uncontrolled allocation size scenarios |
rust/ql/src/queries/security/CWE-770/UncontrolledAllocationSizeGood.rs | Provides a safe allocation example with proper bounds checking |
rust/ql/src/queries/security/CWE-770/UncontrolledAllocationSizeBad.rs | Provides an unsafe allocation example without guards |
rust/ql/lib/codeql/rust/frameworks/stdlib/lang-core.model.yml rust/ql/lib/codeql/rust/frameworks/stdlib/lang-alloc.model.yml rust/ql/lib/codeql/rust/frameworks/libc.model.yml |
Updates and adds model entries pertaining to allocation functions |
Files not reviewed (6)
- rust/ql/lib/codeql/rust/security/UncontrolledAllocationSizeExtensions.qll: Language not supported
- rust/ql/src/queries/security/CWE-770/UncontrolledAllocationSize.qhelp: Language not supported
- rust/ql/src/queries/security/CWE-770/UncontrolledAllocationSize.ql: Language not supported
- rust/ql/src/queries/summary/Stats.qll: Language not supported
- rust/ql/test/query-tests/diagnostics/SummaryStats.expected: Language not supported
- rust/ql/test/query-tests/security/CWE-770/UncontrolledAllocationSize.qlref: Language not supported
Tip: Copilot code review supports C#, Go, Java, JavaScript, Markdown, Python, Ruby and TypeScript, with more languages coming soon. Learn more
from UncontrolledAllocationFlow::PathNode source, UncontrolledAllocationFlow::PathNode sink | ||
where UncontrolledAllocationFlow::flowPath(source, sink) | ||
select sink.getNode(), source, sink, | ||
"This allocation size is derived from a $@ and could allocate arbitrary amounts of memory.", | ||
source.getNode(), "user-provided value" |
Check warning
Code scanning / CodeQL
Consistent alert message Warning
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, it's almost identical to the CPP version though.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks great. I few comments and questions.
I wonder if it would also make sense to model Vec::with_capacity as a sink? That is higher level, so it might be used more out there.
rust/ql/src/queries/security/CWE-770/UncontrolledAllocationSizeGood.rs
Outdated
Show resolved
Hide resolved
* if the overall expression evaluates to `true`; for example on | ||
* `x <= 20` this is the `20`, and on `y > 0` it is `y`. | ||
*/ | ||
private Expr getGreaterOperand(BinaryExpr op) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If these could potentially be useful in other queries we could add them as member predicates to BinaryExpr
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes I have plans to do that, but I think we should add a ComparisonOperation
class and possibly clean up the existing BinaryExpr
hierarchy. So it deserves a PR of its own.
* A sink for uncontrolled allocation size from model data. | ||
*/ | ||
private class ModelsAsDataSink extends Sink { | ||
ModelsAsDataSink() { sinkNode(this, ["alloc-size", "alloc-layout"]) } |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What is the difference between alloc-size
and alloc-layout
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
alloc-size
is an integer that controls the size of an allocation, whereas alloc-layout
is a Layout
that controls an allocation. A Layout
is basically a glorified (size, alignment)
pair, the result of a call such as std::alloc::Layout::array::<u32>(v)
.
The current design has taint flow through Layout
constructors, with sinks where the allocation is actually made. The query doesn't care which kind of sink, but I figured it might be better to tag them separately in case some future query does care about the difference (perhaps because it cares about alignments rather than sizes???).
An alternative and slightly simpler design would be to have an alloc-size
sink directly in the Layout
constructors, rather than a summary, and drop the alloc-layout
sinks (effectively assuming that you would only create a Layout
because you intend to do an allocation).
Another alternative design would be to have taint/data flow to the size
field of the Layout
and have alloc-size
sinks on the size
field of the allocations that use a layout.
…eGood.rs Co-authored-by: Simon Friis Vindum <[email protected]>
Yes I think it does make sense, and there are a bunch of other container class methods that might have similar properties. My (optimistic) hope is that auto-modelling can fill in the gaps, and the test cases for |
…n't have to deal with test result changes there as often.
DCA LGTM, a bit uneventful, it looks like we're not finding many sinks for this initial version of the query. |
New query
rust/uncontrolled-allocation-size
for uncontrolled allocations, that is, where user input is allowed to control the size of a memory allocation with no guard.Note that there's a related issue when a size calculation can overflow, possibly leading to an under-allocation and consequent buffer overrun. The worst (but not uncommon) case is when these two issues coincide, giving an attacker the ability to control the buffer overrun. We probably want another query for overflowing arithmetic at some point to get good overall coverage.
TODO: