From ae6b7174b7a660ee6c79045e66a98f408a6a5dc5 Mon Sep 17 00:00:00 2001 From: Greg Kroah-Hartman Date: Mon, 2 Dec 2024 10:58:10 +0100 Subject: [PATCH] 5.15-stable patches added patches: ksmbd-fix-slab-use-after-free-in-smb3_preauth_hash_rsp.patch --- ...-after-free-in-smb3_preauth_hash_rsp.patch | 39 +++++++++++++++++++ queue-5.15/series | 1 + 2 files changed, 40 insertions(+) create mode 100644 queue-5.15/ksmbd-fix-slab-use-after-free-in-smb3_preauth_hash_rsp.patch diff --git a/queue-5.15/ksmbd-fix-slab-use-after-free-in-smb3_preauth_hash_rsp.patch b/queue-5.15/ksmbd-fix-slab-use-after-free-in-smb3_preauth_hash_rsp.patch new file mode 100644 index 00000000000..9a283d2c560 --- /dev/null +++ b/queue-5.15/ksmbd-fix-slab-use-after-free-in-smb3_preauth_hash_rsp.patch @@ -0,0 +1,39 @@ +From b8fc56fbca7482c1e5c0e3351c6ae78982e25ada Mon Sep 17 00:00:00 2001 +From: Namjae Jeon +Date: Mon, 4 Nov 2024 13:40:41 +0900 +Subject: ksmbd: fix slab-use-after-free in smb3_preauth_hash_rsp + +From: Namjae Jeon + +commit b8fc56fbca7482c1e5c0e3351c6ae78982e25ada upstream. + +ksmbd_user_session_put should be called under smb3_preauth_hash_rsp(). +It will avoid freeing session before calling smb3_preauth_hash_rsp(). + +Cc: stable@vger.kernel.org # v5.15+ +Reported-by: Norbert Szetei +Tested-by: Norbert Szetei +Signed-off-by: Namjae Jeon +Signed-off-by: Steve French +Signed-off-by: Mingli Yu +Signed-off-by: Greg Kroah-Hartman +--- + fs/ksmbd/server.c | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +--- a/fs/ksmbd/server.c ++++ b/fs/ksmbd/server.c +@@ -238,11 +238,11 @@ static void __handle_ksmbd_work(struct k + } while (is_chained == true); + + send: +- if (work->sess) +- ksmbd_user_session_put(work->sess); + if (work->tcon) + ksmbd_tree_connect_put(work->tcon); + smb3_preauth_hash_rsp(work); ++ if (work->sess) ++ ksmbd_user_session_put(work->sess); + if (work->sess && work->sess->enc && work->encrypted && + conn->ops->encrypt_resp) { + rc = conn->ops->encrypt_resp(work); diff --git a/queue-5.15/series b/queue-5.15/series index ebcfb6f8518..c43c427bb3a 100644 --- a/queue-5.15/series +++ b/queue-5.15/series @@ -283,3 +283,4 @@ staging-greybus-uart-fix-atomicity-violation-in-get_.patch alsa-hda-realtek-update-alc256-depop-procedure.patch apparmor-fix-do-simple-duplicate-message-elimination.patch parisc-fix-a-possible-dma-corruption.patch +ksmbd-fix-slab-use-after-free-in-smb3_preauth_hash_rsp.patch -- 2.47.3