diff options
author | Chih-Yen Chang <cc85nod@gmail.com> | 2023-05-05 17:03:54 +0200 |
---|---|---|
committer | Steve French <stfrench@microsoft.com> | 2023-05-16 17:26:14 +0200 |
commit | 443d61d1fa9faa60ef925513d83742902390100f (patch) | |
tree | 01b7aef0a5bf4155865d326da98b2afe0df936ac /fs | |
parent | ksmbd: fix wrong UserName check in session_user (diff) | |
download | linux-443d61d1fa9faa60ef925513d83742902390100f.tar.xz linux-443d61d1fa9faa60ef925513d83742902390100f.zip |
ksmbd: allocate one more byte for implied bcc[0]
ksmbd_smb2_check_message allows client to return one byte more, so we
need to allocate additional memory in ksmbd_conn_handler_loop to avoid
out-of-bound access.
Cc: stable@vger.kernel.org
Signed-off-by: Chih-Yen Chang <cc85nod@gmail.com>
Acked-by: Namjae Jeon <linkinjeon@kernel.org>
Signed-off-by: Steve French <stfrench@microsoft.com>
Diffstat (limited to 'fs')
-rw-r--r-- | fs/ksmbd/connection.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/fs/ksmbd/connection.c b/fs/ksmbd/connection.c index 4ed379f9b1aa..4882a812ea86 100644 --- a/fs/ksmbd/connection.c +++ b/fs/ksmbd/connection.c @@ -351,7 +351,8 @@ int ksmbd_conn_handler_loop(void *p) break; /* 4 for rfc1002 length field */ - size = pdu_size + 4; + /* 1 for implied bcc[0] */ + size = pdu_size + 4 + 1; conn->request_buf = kvmalloc(size, GFP_KERNEL); if (!conn->request_buf) break; |