From: Paulo Alcantara <pc@manguebit.com>
To: Maximilian Heyne <mheyne@amazon.de>
Cc: smfrench@gmail.com, linux-cifs@vger.kernel.org, j51569436@gmail.com
Subject: Re: [PATCH 2/2] smb: client: fix potential OOB in smb2_dump_detail()
Date: Tue, 19 Dec 2023 11:57:03 -0300 [thread overview]
Message-ID: <3b34f59a0f89fb09dec5e1b04f74b70d@manguebit.com> (raw)
In-Reply-To: <ZYGp5FL9UYY5lYHg@amazon.de>
Maximilian Heyne <mheyne@amazon.de> writes:
> On Sat, Dec 16, 2023 at 01:10:05AM -0300, Paulo Alcantara wrote:
>> Validate SMB message with ->check_message() before calling
>> ->calc_smb_size().
>>
>> This fixes CVE-2023-6610.
>>
>> Reported-by: j51569436@gmail.com
>> Closes: https://bugzilla.kernel.org/show_bug.cgi?id=218219
>> Signed-off-by: Paulo Alcantara <pc@manguebit.com>
>> ---
>> fs/smb/client/smb2ops.c | 6 ++++--
>> 1 file changed, 4 insertions(+), 2 deletions(-)
>>
>> diff --git a/fs/smb/client/smb2ops.c b/fs/smb/client/smb2ops.c
>> index 62b0a8df867b..66b310208545 100644
>> --- a/fs/smb/client/smb2ops.c
>> +++ b/fs/smb/client/smb2ops.c
>> @@ -403,8 +403,10 @@ smb2_dump_detail(void *buf, struct TCP_Server_Info *server)
>> cifs_server_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d\n",
>> shdr->Command, shdr->Status, shdr->Flags, shdr->MessageId,
>> shdr->Id.SyncId.ProcessId);
>> - cifs_server_dbg(VFS, "smb buf %p len %u\n", buf,
>> - server->ops->calc_smb_size(buf));
>> + if (!server->ops->check_message(buf, server->total_read, server)) {
>
> Why is this check negated? Sorry for this stupid question. I'm not
> familiar with this code but only stumbled upon this commit due to a
> CVE.
Because smb2_check_message() returns 0 for a valid SMB response and then
it would be safe to call ->calc_smb_size() as we know the header has a
valid Command (< NUMBER_OF_SMB2_COMMANDS).
next prev parent reply other threads:[~2023-12-19 14:57 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-12-16 4:10 [PATCH 1/2] smb: client: fix potential OOB in cifs_dump_detail() Paulo Alcantara
2023-12-16 4:10 ` [PATCH 2/2] smb: client: fix potential OOB in smb2_dump_detail() Paulo Alcantara
2023-12-19 14:34 ` Maximilian Heyne
2023-12-19 14:57 ` Paulo Alcantara [this message]
2023-12-19 16:10 ` [PATCH v2] " Paulo Alcantara
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=3b34f59a0f89fb09dec5e1b04f74b70d@manguebit.com \
--to=pc@manguebit.com \
--cc=j51569436@gmail.com \
--cc=linux-cifs@vger.kernel.org \
--cc=mheyne@amazon.de \
--cc=smfrench@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox