CVE-2023-4091: smbd: use open_access_mask for access check in open_file()
authorRalph Boehme <slow@samba.org>
Tue, 1 Aug 2023 11:04:36 +0000 (13:04 +0200)
committerJule Anger <janger@samba.org>
Mon, 9 Oct 2023 20:14:05 +0000 (22:14 +0200)
If the client requested FILE_OVERWRITE[_IF], we're implicitly adding
FILE_WRITE_DATA to the open_access_mask in open_file_ntcreate(), but for the
access check we're using access_mask which doesn't contain the additional
right, which means we can end up truncating a file for which the user has
only read-only access via an SD.

BUG: https://bugzilla.samba.org/show_bug.cgi?id=15439

Signed-off-by: Ralph Boehme <slow@samba.org>
selftest/knownfail.d/samba3.smb2.acls [deleted file]
source3/smbd/open.c

diff --git a/selftest/knownfail.d/samba3.smb2.acls b/selftest/knownfail.d/samba3.smb2.acls
deleted file mode 100644 (file)
index 18df260..0000000
+++ /dev/null
@@ -1 +0,0 @@
-^samba3.smb2.acls.OVERWRITE_READ_ONLY_FILE
index 87719eec06e6aabb6d829e62617c8ba8d74d2720..93c12e00eb0d9f92f1b3f6d4bca4a8d4b33124f7 100644 (file)
@@ -1442,7 +1442,7 @@ static NTSTATUS open_file(struct smb_request *req,
                                                dirfsp,
                                                fsp,
                                                false,
-                                               access_mask);
+                                               open_access_mask);
 
                                if (!NT_STATUS_IS_OK(status)) {
                                        DBG_DEBUG("smbd_check_access_rights_fsp"
@@ -1633,7 +1633,7 @@ static NTSTATUS open_file(struct smb_request *req,
                        status = smbd_check_access_rights_fsp(dirfsp,
                                                              fsp,
                                                              false,
-                                                             access_mask);
+                                                             open_access_mask);
 
                        if (NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND) &&
                            posix_open &&