This is a note to let you know that I've just added the patch titled ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob() to the 6.1-stable tree which can be found at: http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary The filename of the patch is: ksmbd-fix-slub-overflow-in-ksmbd_decode_ntlmssp_auth_blob.patch and it can be found in the queue-6.1 subdirectory. If you, or anyone else, feels it should not be added to the stable tree, please let <stable@xxxxxxxxxxxxxxx> know about it. >From 4b081ce0d830b684fdf967abc3696d1261387254 Mon Sep 17 00:00:00 2001 From: Namjae Jeon <linkinjeon@xxxxxxxxxx> Date: Fri, 25 Aug 2023 23:40:31 +0900 Subject: ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob() From: Namjae Jeon <linkinjeon@xxxxxxxxxx> commit 4b081ce0d830b684fdf967abc3696d1261387254 upstream. If authblob->SessionKey.Length is bigger than session key size(CIFS_KEY_SIZE), slub overflow can happen in key exchange codes. cifs_arc4_crypt copy to session key array from SessionKey from client. Cc: stable@xxxxxxxxxxxxxxx Reported-by: zdi-disclosures@xxxxxxxxxxxxxx # ZDI-CAN-21940 Signed-off-by: Namjae Jeon <linkinjeon@xxxxxxxxxx> Signed-off-by: Steve French <stfrench@xxxxxxxxxxxxx> Signed-off-by: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx> --- fs/smb/server/auth.c | 3 +++ 1 file changed, 3 insertions(+) --- a/fs/smb/server/auth.c +++ b/fs/smb/server/auth.c @@ -355,6 +355,9 @@ int ksmbd_decode_ntlmssp_auth_blob(struc if (blob_len < (u64)sess_key_off + sess_key_len) return -EINVAL; + if (sess_key_len > CIFS_KEY_SIZE) + return -EINVAL; + ctx_arc4 = kmalloc(sizeof(*ctx_arc4), GFP_KERNEL); if (!ctx_arc4) return -ENOMEM; Patches currently in stable-queue which might be from linkinjeon@xxxxxxxxxx are queue-6.1/ksmbd-reduce-descriptor-size-if-remaining-bytes-is-less-than-request-size.patch queue-6.1/ksmbd-fix-slub-overflow-in-ksmbd_decode_ntlmssp_auth_blob.patch queue-6.1/ksmbd-fix-wrong-dataoffset-validation-of-create-context.patch queue-6.1/ksmbd-replace-one-element-array-with-flex-array-member-in-struct-smb2_ea_info.patch