Skip to content

Commit b3bf1ba

Browse files
committed
smb: client: fix use-after-free in crypt_message when using async crypto
JIRA: https://issues.redhat.com/browse/RHEL-104401 Conflicts: - Context difference due to missing upstream commit Fixes: d08089f ("cifs: Change the I/O paths to use an iterator rather than a page list") in RHEL 9.7. commit b220bed Author: Wang Zhaolong <wangzhaolong@huaweicloud.com> Date: Sat Jul 5 10:51:18 2025 +0800 smb: client: fix use-after-free in crypt_message when using async crypto The CVE-2024-50047 fix removed asynchronous crypto handling from crypt_message(), assuming all crypto operations are synchronous. However, when hardware crypto accelerators are used, this can cause use-after-free crashes: crypt_message() // Allocate the creq buffer containing the req creq = smb2_get_aead_req(..., &req); // Async encryption returns -EINPROGRESS immediately rc = enc ? crypto_aead_encrypt(req) : crypto_aead_decrypt(req); // Free creq while async operation is still in progress kvfree_sensitive(creq, ...); Hardware crypto modules often implement async AEAD operations for performance. When crypto_aead_encrypt/decrypt() returns -EINPROGRESS, the operation completes asynchronously. Without crypto_wait_req(), the function immediately frees the request buffer, leading to crashes when the driver later accesses the freed memory. This results in a use-after-free condition when the hardware crypto driver later accesses the freed request structure, leading to kernel crashes with NULL pointer dereferences. The issue occurs because crypto_alloc_aead() with mask=0 doesn't guarantee synchronous operation. Even without CRYPTO_ALG_ASYNC in the mask, async implementations can be selected. Fix by restoring the async crypto handling: - DECLARE_CRYPTO_WAIT(wait) for completion tracking - aead_request_set_callback() for async completion notification - crypto_wait_req() to wait for operation completion This ensures the request buffer isn't freed until the crypto operation completes, whether synchronous or asynchronous, while preserving the CVE-2024-50047 fix. Fixes: b0abcd6 ("smb: client: fix UAF in async decryption") Link: https://lore.kernel.org/all/8b784a13-87b0-4131-9ff9-7a8993538749@huaweicloud.com/ Cc: stable@vger.kernel.org Reviewed-by: Paulo Alcantara (Red Hat) <pc@manguebit.org> Signed-off-by: Wang Zhaolong <wangzhaolong@huaweicloud.com> Signed-off-by: Steve French <stfrench@microsoft.com> Signed-off-by: Paulo Alcantara <paalcant@redhat.com>
1 parent 2534061 commit b3bf1ba

File tree

1 file changed

+6
-1
lines changed

1 file changed

+6
-1
lines changed

fs/smb/client/smb2ops.c

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4261,6 +4261,7 @@ crypt_message(struct TCP_Server_Info *server, int num_rqst,
42614261
u8 key[SMB3_ENC_DEC_KEY_SIZE];
42624262
struct aead_request *req;
42634263
u8 *iv;
4264+
DECLARE_CRYPTO_WAIT(wait);
42644265
unsigned int crypt_len = le32_to_cpu(tr_hdr->OriginalMessageSize);
42654266
void *creq;
42664267

@@ -4309,7 +4310,11 @@ crypt_message(struct TCP_Server_Info *server, int num_rqst,
43094310
aead_request_set_crypt(req, sg, sg, crypt_len, iv);
43104311
aead_request_set_ad(req, assoc_data_len);
43114312

4312-
rc = enc ? crypto_aead_encrypt(req) : crypto_aead_decrypt(req);
4313+
aead_request_set_callback(req, CRYPTO_TFM_REQ_MAY_BACKLOG,
4314+
crypto_req_done, &wait);
4315+
4316+
rc = crypto_wait_req(enc ? crypto_aead_encrypt(req)
4317+
: crypto_aead_decrypt(req), &wait);
43134318

43144319
if (!rc && enc)
43154320
memcpy(&tr_hdr->Signature, sign, SMB2_SIGNATURE_SIZE);

0 commit comments

Comments
 (0)