1 From c119f4ede3fa90a9463f50831761c28f989bfb20 Mon Sep 17 00:00:00 2001
2 From: Namjae Jeon <linkinjeon@kernel.org>
3 Date: Thu, 11 Apr 2024 23:02:15 +0900
4 Subject: ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf
6 From: Namjae Jeon <linkinjeon@kernel.org>
8 commit c119f4ede3fa90a9463f50831761c28f989bfb20 upstream.
10 If ->ProtocolId is SMB2_TRANSFORM_PROTO_NUM, smb2 request size
11 validation could be skipped. if request size is smaller than
12 sizeof(struct smb2_query_info_req), slab-out-of-bounds read can happen in
13 smb2_allocate_rsp_buf(). This patch allocate response buffer after
14 decrypting transform request. smb3_decrypt_req() will validate transform
15 request size and avoid slab-out-of-bound in smb2_allocate_rsp_buf().
17 Reported-by: Norbert Szetei <norbert@doyensec.com>
18 Cc: stable@vger.kernel.org
19 Signed-off-by: Namjae Jeon <linkinjeon@kernel.org>
20 Signed-off-by: Steve French <stfrench@microsoft.com>
21 Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
23 fs/smb/server/server.c | 13 +++++--------
24 1 file changed, 5 insertions(+), 8 deletions(-)
26 --- a/fs/smb/server/server.c
27 +++ b/fs/smb/server/server.c
28 @@ -167,20 +167,17 @@ static void __handle_ksmbd_work(struct k
30 bool is_chained = false;
32 - if (conn->ops->allocate_rsp_buf(work))
35 if (conn->ops->is_transform_hdr &&
36 conn->ops->is_transform_hdr(work->request_buf)) {
37 rc = conn->ops->decrypt_req(work);
39 - conn->ops->set_rsp_status(work, STATUS_DATA_ERROR);
45 work->encrypted = true;
48 + if (conn->ops->allocate_rsp_buf(work))
51 rc = conn->ops->init_rsp_hdr(work);
53 /* either uid or tid is not correct */