]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
ksmbd: fix null pointer dereference in alloc_preauth_hash()
authorNamjae Jeon <linkinjeon@kernel.org>
Wed, 2 Apr 2025 00:11:23 +0000 (09:11 +0900)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 10 Apr 2025 12:39:39 +0000 (14:39 +0200)
commit c8b5b7c5da7d0c31c9b7190b4a7bba5281fc4780 upstream.

The Client send malformed smb2 negotiate request. ksmbd return error
response. Subsequently, the client can send smb2 session setup even
thought conn->preauth_info is not allocated.
This patch add KSMBD_SESS_NEED_SETUP status of connection to ignore
session setup request if smb2 negotiate phase is not complete.

Cc: stable@vger.kernel.org
Tested-by: Steve French <stfrench@microsoft.com>
Reported-by: zdi-disclosures@trendmicro.com # ZDI-CAN-26505
Signed-off-by: Namjae Jeon <linkinjeon@kernel.org>
Signed-off-by: Steve French <stfrench@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
fs/smb/server/connection.h
fs/smb/server/mgmt/user_session.c
fs/smb/server/smb2pdu.c

index 91c2318639e76646ee1706bf2fb93c51bdeefb29..14620e147dda570bc8d48b48250aad5438d5d75d 100644 (file)
@@ -27,6 +27,7 @@ enum {
        KSMBD_SESS_EXITING,
        KSMBD_SESS_NEED_RECONNECT,
        KSMBD_SESS_NEED_NEGOTIATE,
+       KSMBD_SESS_NEED_SETUP,
        KSMBD_SESS_RELEASING
 };
 
@@ -187,6 +188,11 @@ static inline bool ksmbd_conn_need_negotiate(struct ksmbd_conn *conn)
        return READ_ONCE(conn->status) == KSMBD_SESS_NEED_NEGOTIATE;
 }
 
+static inline bool ksmbd_conn_need_setup(struct ksmbd_conn *conn)
+{
+       return READ_ONCE(conn->status) == KSMBD_SESS_NEED_SETUP;
+}
+
 static inline bool ksmbd_conn_need_reconnect(struct ksmbd_conn *conn)
 {
        return READ_ONCE(conn->status) == KSMBD_SESS_NEED_RECONNECT;
@@ -217,6 +223,11 @@ static inline void ksmbd_conn_set_need_negotiate(struct ksmbd_conn *conn)
        WRITE_ONCE(conn->status, KSMBD_SESS_NEED_NEGOTIATE);
 }
 
+static inline void ksmbd_conn_set_need_setup(struct ksmbd_conn *conn)
+{
+       WRITE_ONCE(conn->status, KSMBD_SESS_NEED_SETUP);
+}
+
 static inline void ksmbd_conn_set_need_reconnect(struct ksmbd_conn *conn)
 {
        WRITE_ONCE(conn->status, KSMBD_SESS_NEED_RECONNECT);
index 0963693015eeae1f8a3db1ed179d74ed2bd50dd3..f83daf72f877e2d767f69183ba4a5c1416fb7a75 100644 (file)
@@ -374,13 +374,13 @@ void destroy_previous_session(struct ksmbd_conn *conn,
        ksmbd_all_conn_set_status(id, KSMBD_SESS_NEED_RECONNECT);
        err = ksmbd_conn_wait_idle_sess_id(conn, id);
        if (err) {
-               ksmbd_all_conn_set_status(id, KSMBD_SESS_NEED_NEGOTIATE);
+               ksmbd_all_conn_set_status(id, KSMBD_SESS_NEED_SETUP);
                goto out;
        }
 
        ksmbd_destroy_file_table(&prev_sess->file_table);
        prev_sess->state = SMB2_SESSION_EXPIRED;
-       ksmbd_all_conn_set_status(id, KSMBD_SESS_NEED_NEGOTIATE);
+       ksmbd_all_conn_set_status(id, KSMBD_SESS_NEED_SETUP);
        ksmbd_launch_ksmbd_durable_scavenger();
 out:
        up_write(&conn->session_lock);
index 3a3c0a99eb0458ee9ccf766a7f0816360830be54..7fea86edc717630a96425400ea3478840836ff03 100644 (file)
@@ -1247,7 +1247,7 @@ int smb2_handle_negotiate(struct ksmbd_work *work)
        }
 
        conn->srv_sec_mode = le16_to_cpu(rsp->SecurityMode);
-       ksmbd_conn_set_need_negotiate(conn);
+       ksmbd_conn_set_need_setup(conn);
 
 err_out:
        if (rc)
@@ -1268,6 +1268,9 @@ static int alloc_preauth_hash(struct ksmbd_session *sess,
        if (sess->Preauth_HashValue)
                return 0;
 
+       if (!conn->preauth_info)
+               return -ENOMEM;
+
        sess->Preauth_HashValue = kmemdup(conn->preauth_info->Preauth_HashValue,
                                          PREAUTH_HASHVALUE_SIZE, GFP_KERNEL);
        if (!sess->Preauth_HashValue)
@@ -1671,6 +1674,11 @@ int smb2_sess_setup(struct ksmbd_work *work)
 
        ksmbd_debug(SMB, "Received request for session setup\n");
 
+       if (!ksmbd_conn_need_setup(conn) && !ksmbd_conn_good(conn)) {
+               work->send_no_response = 1;
+               return rc;
+       }
+
        WORK_BUFFERS(work, req, rsp);
 
        rsp->StructureSize = cpu_to_le16(9);
@@ -1906,7 +1914,7 @@ out_err:
                        if (try_delay) {
                                ksmbd_conn_set_need_reconnect(conn);
                                ssleep(5);
-                               ksmbd_conn_set_need_negotiate(conn);
+                               ksmbd_conn_set_need_setup(conn);
                        }
                }
                smb2_set_err_rsp(work);
@@ -2238,7 +2246,7 @@ int smb2_session_logoff(struct ksmbd_work *work)
                ksmbd_free_user(sess->user);
                sess->user = NULL;
        }
-       ksmbd_all_conn_set_status(sess_id, KSMBD_SESS_NEED_NEGOTIATE);
+       ksmbd_all_conn_set_status(sess_id, KSMBD_SESS_NEED_SETUP);
 
        rsp->StructureSize = cpu_to_le16(4);
        err = ksmbd_iov_pin_rsp(work, rsp, sizeof(struct smb2_logoff_rsp));