ksmbd: Fix buffer length check in fsctl_validate_negotiate_info()
commit78f1688a64
upstream. The validate_negotiate_info_req struct definition includes an extra field to access the data coming after the header. This causes the check in fsctl_validate_negotiate_info() to count the first element of the array twice. This in turn makes some valid requests fail, depending on whether they include padding or not. Fixes:f7db8fd03a
("ksmbd: add validation in smb2_ioctl") Cc: stable@vger.kernel.org # v5.15 Acked-by: Namjae Jeon <linkinjeon@kernel.org> Acked-by: Hyunchul Lee <hyc.lee@gmail.com> Signed-off-by: Marios Makassikis <mmakassikis@freebox.fr> Signed-off-by: Steve French <stfrench@microsoft.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
This commit is contained in:
Родитель
5e84e9d61d
Коммит
aacb2ddb67
|
@ -7319,7 +7319,7 @@ static int fsctl_validate_negotiate_info(struct ksmbd_conn *conn,
|
|||
int ret = 0;
|
||||
int dialect;
|
||||
|
||||
if (in_buf_len < sizeof(struct validate_negotiate_info_req) +
|
||||
if (in_buf_len < offsetof(struct validate_negotiate_info_req, Dialects) +
|
||||
le16_to_cpu(neg_req->DialectCount) * sizeof(__le16))
|
||||
return -EINVAL;
|
||||
|
||||
|
|
Загрузка…
Ссылка в новой задаче