ksmbd: validate zero num_subauth before sub_auth is accessed
authorNorbert Szetei <norbert@doyensec.com>
Sat, 29 Mar 2025 16:06:01 +0000 (16:06 +0000)
committerSteve French <stfrench@microsoft.com>
Tue, 1 Apr 2025 05:04:21 +0000 (00:04 -0500)
Access psid->sub_auth[psid->num_subauth - 1] without checking
if num_subauth is non-zero leads to an out-of-bounds read.
This patch adds a validation step to ensure num_subauth != 0
before sub_auth is accessed.

Cc: stable@vger.kernel.org
Signed-off-by: Norbert Szetei <norbert@doyensec.com>
Acked-by: Namjae Jeon <linkinjeon@kernel.org>
Signed-off-by: Steve French <stfrench@microsoft.com>
fs/smb/server/smbacl.c

index 2693ea2d67aa7deb7b965124fe2fa7a2c54cf561..5aa7a66334d93d4002800a198982463a825dff07 100644 (file)
@@ -270,6 +270,11 @@ static int sid_to_id(struct mnt_idmap *idmap,
                return -EIO;
        }
 
+       if (psid->num_subauth == 0) {
+               pr_err("%s: zero subauthorities!\n", __func__);
+               return -EIO;
+       }
+
        if (sidtype == SIDOWNER) {
                kuid_t uid;
                uid_t id;