Description
In the Linux kernel, the following vulnerability has been resolved: smb: client: validate the whole DACL before rewriting it in cifsacl build_sec_desc() and id_mode_to_cifs_acl() derive a DACL pointer from a server-supplied dacloffset and then use the incoming ACL to rebuild the chmod/chown security descriptor. The original fix only checked that the struct smb_acl header fits before reading dacl_ptr->size or dacl_ptr->num_aces. That avoids the immediate header-field OOB read, but the rewrite helpers still walk ACEs based on pdacl->num_aces with no structural validation of the incoming DACL body. A malicious server can return a truncated DACL that still contains a header, claims one or more ACEs, and then drive replace_sids_and_copy_aces() or set_chmod_dacl() past the validated extent while they compare or copy attacker-controlled ACEs. Factor the DACL structural checks into validate_dacl(), extend them to validate each ACE against the DACL bounds, and use the shared validator before the chmod/chown rebuild paths. parse_dacl() reuses the same validator so the read-side parser and write-side rewrite paths agree on what constitutes a well-formed incoming DACL.
Product status
bc3e9dd9d104ca1b75644eab87b38ce8a924aef4 (git) before d92f3f0b22414e7515696a02224d0af55e3004a3
bc3e9dd9d104ca1b75644eab87b38ce8a924aef4 (git) before b78db9bddc84136f6a0bb49e8883cf200dfb87a8
bc3e9dd9d104ca1b75644eab87b38ce8a924aef4 (git) before 0a8cf165566ba55a39fd0f4de172119dd646d39a
5.12
Any version before 5.12
6.12.86 (semver)
7.0.2 (semver)
7.1-rc1 (original_commit_for_fix)
References
git.kernel.org/...c/d92f3f0b22414e7515696a02224d0af55e3004a3
git.kernel.org/...c/b78db9bddc84136f6a0bb49e8883cf200dfb87a8
git.kernel.org/...c/0a8cf165566ba55a39fd0f4de172119dd646d39a