Skip to content

Commit 925ff7a

Browse files
committed
smb: client: fix use-after-free bug in cifs_debug_data_proc_show()
jira LE-4669 cve CVE-2023-52752 Rebuild_History Non-Buildable kernel-4.18.0-553.82.1.el8_10 commit-author Paulo Alcantara <pc@manguebit.com> commit d328c09 Skip SMB sessions that are being teared down (e.g. @ses->ses_status == SES_EXITING) in cifs_debug_data_proc_show() to avoid use-after-free in @SES. This fixes the following GPF when reading from /proc/fs/cifs/DebugData while mounting and umounting [ 816.251274] general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI ... [ 816.260138] Call Trace: [ 816.260329] <TASK> [ 816.260499] ? die_addr+0x36/0x90 [ 816.260762] ? exc_general_protection+0x1b3/0x410 [ 816.261126] ? asm_exc_general_protection+0x26/0x30 [ 816.261502] ? cifs_debug_tcon+0xbd/0x240 [cifs] [ 816.261878] ? cifs_debug_tcon+0xab/0x240 [cifs] [ 816.262249] cifs_debug_data_proc_show+0x516/0xdb0 [cifs] [ 816.262689] ? seq_read_iter+0x379/0x470 [ 816.262995] seq_read_iter+0x118/0x470 [ 816.263291] proc_reg_read_iter+0x53/0x90 [ 816.263596] ? srso_alias_return_thunk+0x5/0x7f [ 816.263945] vfs_read+0x201/0x350 [ 816.264211] ksys_read+0x75/0x100 [ 816.264472] do_syscall_64+0x3f/0x90 [ 816.264750] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 816.265135] RIP: 0033:0x7fd5e669d381 Cc: stable@vger.kernel.org Signed-off-by: Paulo Alcantara (SUSE) <pc@manguebit.com> Signed-off-by: Steve French <stfrench@microsoft.com> (cherry picked from commit d328c09) Signed-off-by: Jonathan Maple <jmaple@ciq.com>
1 parent 1ac8167 commit 925ff7a

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

fs/cifs/cifs_debug.c

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -395,6 +395,11 @@ static int cifs_debug_data_proc_show(struct seq_file *m, void *v)
395395
seq_printf(m, "\n\n\tSessions: ");
396396
i = 0;
397397
list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) {
398+
spin_lock(&ses->ses_lock);
399+
if (ses->ses_status == SES_EXITING) {
400+
spin_unlock(&ses->ses_lock);
401+
continue;
402+
}
398403
i++;
399404
if ((ses->serverDomain == NULL) ||
400405
(ses->serverOS == NULL) ||
@@ -415,6 +420,7 @@ static int cifs_debug_data_proc_show(struct seq_file *m, void *v)
415420
ses->ses_count, ses->serverOS, ses->serverNOS,
416421
ses->capabilities, ses->status);
417422
}
423+
spin_unlock(&ses->ses_lock);
418424

419425
seq_printf(m, "\n\tSecurity type: %s ",
420426
get_security_type_str(server->ops->select_sectype(server, ses->sectype)));

0 commit comments

Comments
 (0)