]> www.infradead.org Git - users/jedix/linux-maple.git/commitdiff
ksmbd: fix slab-use-after-free in ksmbd_smb2_session_create
authorNamjae Jeon <linkinjeon@kernel.org>
Sat, 2 Nov 2024 09:46:38 +0000 (18:46 +0900)
committerNamjae Jeon <linkinjeon@kernel.org>
Tue, 5 Nov 2024 00:26:35 +0000 (09:26 +0900)
There is a race condition between ksmbd_smb2_session_create and
ksmbd_expire_session. This patch add missing sessions_table_lock
while adding/deleting session from global session table.

Cc: stable@vger.kernel.org # v5.15+
Reported-by: Norbert Szetei <norbert@doyensec.com>
Tested-by: Norbert Szetei <norbert@doyensec.com>
Signed-off-by: Namjae Jeon <linkinjeon@kernel.org>
Signed-off-by: Steve French <stfrench@microsoft.com>
fs/smb/server/mgmt/user_session.c

index 9756a4bbfe5402f41e4b0325d9cb72482a29391c..ad02fe555fda7e404ed106bf3c7e9296cfdc0f39 100644 (file)
@@ -178,6 +178,7 @@ static void ksmbd_expire_session(struct ksmbd_conn *conn)
        unsigned long id;
        struct ksmbd_session *sess;
 
+       down_write(&sessions_table_lock);
        down_write(&conn->session_lock);
        xa_for_each(&conn->sessions, id, sess) {
                if (atomic_read(&sess->refcnt) == 0 &&
@@ -191,6 +192,7 @@ static void ksmbd_expire_session(struct ksmbd_conn *conn)
                }
        }
        up_write(&conn->session_lock);
+       up_write(&sessions_table_lock);
 }
 
 int ksmbd_session_register(struct ksmbd_conn *conn,
@@ -232,7 +234,6 @@ void ksmbd_sessions_deregister(struct ksmbd_conn *conn)
                        }
                }
        }
-       up_write(&sessions_table_lock);
 
        down_write(&conn->session_lock);
        xa_for_each(&conn->sessions, id, sess) {
@@ -252,6 +253,7 @@ void ksmbd_sessions_deregister(struct ksmbd_conn *conn)
                }
        }
        up_write(&conn->session_lock);
+       up_write(&sessions_table_lock);
 }
 
 struct ksmbd_session *ksmbd_session_lookup(struct ksmbd_conn *conn,