ksmbd: allocate one more byte for implied bcc[0]

commit 443d61d1fa9faa60ef925513d83742902390100f upstream.

ksmbd_smb2_check_message allows client to return one byte more, so we
need to allocate additional memory in ksmbd_conn_handler_loop to avoid
out-of-bound access.

Cc: stable@vger.kernel.org
Signed-off-by: Chih-Yen Chang <cc85nod@gmail.com>
Acked-by: Namjae Jeon <linkinjeon@kernel.org>
Signed-off-by: Steve French <stfrench@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
This commit is contained in:
Chih-Yen Chang 2023-05-06 00:03:54 +09:00 committed by Greg Kroah-Hartman
parent f1d013b0f0
commit af7335a4b9

View File

@ -353,7 +353,8 @@ int ksmbd_conn_handler_loop(void *p)
break; break;
/* 4 for rfc1002 length field */ /* 4 for rfc1002 length field */
size = pdu_size + 4; /* 1 for implied bcc[0] */
size = pdu_size + 4 + 1;
conn->request_buf = kvmalloc(size, GFP_KERNEL); conn->request_buf = kvmalloc(size, GFP_KERNEL);
if (!conn->request_buf) if (!conn->request_buf)
break; break;