From: Paulo Alcantara Date: Tue, 2 Apr 2024 19:34:00 +0000 (-0300) Subject: smb: client: fix potential UAF in is_valid_oplock_break() X-Git-Tag: v6.8.5~28 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=16d58c6a7db5050b9638669084b63fc05f951825;p=thirdparty%2Fkernel%2Fstable.git smb: client: fix potential UAF in is_valid_oplock_break() commit 69ccf040acddf33a3a85ec0f6b45ef84b0f7ec29 upstream. Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF. Cc: stable@vger.kernel.org Signed-off-by: Paulo Alcantara (Red Hat) Signed-off-by: Steve French Signed-off-by: Greg Kroah-Hartman --- diff --git a/fs/smb/client/misc.c b/fs/smb/client/misc.c index df65cef63afb9..74627d647818a 100644 --- a/fs/smb/client/misc.c +++ b/fs/smb/client/misc.c @@ -484,6 +484,8 @@ is_valid_oplock_break(char *buffer, struct TCP_Server_Info *srv) /* look up tcon based on tid & uid */ spin_lock(&cifs_tcp_ses_lock); list_for_each_entry(ses, &pserver->smb_ses_list, smb_ses_list) { + if (cifs_ses_exiting(ses)) + continue; list_for_each_entry(tcon, &ses->tcon_list, tcon_list) { if (tcon->tid != buf->Tid) continue;