diff options
author | 2024-09-11 23:35:44 +0800 | |
---|---|---|
committer | 2024-09-17 16:50:18 +0200 | |
commit | 609366e7a06d035990df78f1562291c3bf0d4a12 (patch) | |
tree | 275920acebfcf5b05b56b517e5b2e3d09efd22c9 /tools/perf/scripts/python/call-graph-from-postgresql.py | |
parent | i3c: master: svc: adjust SDR according to i3c spec (diff) | |
download | wireguard-linux-609366e7a06d035990df78f1562291c3bf0d4a12.tar.xz wireguard-linux-609366e7a06d035990df78f1562291c3bf0d4a12.zip |
i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition
In the cdns_i3c_master_probe function, &master->hj_work is bound with
cdns_i3c_master_hj. And cdns_i3c_master_interrupt can call
cnds_i3c_master_demux_ibis function to start the work.
If we remove the module which will call cdns_i3c_master_remove to
make cleanup, it will free master->base through i3c_master_unregister
while the work mentioned above will be used. The sequence of operations
that may lead to a UAF bug is as follows:
CPU0 CPU1
| cdns_i3c_master_hj
cdns_i3c_master_remove |
i3c_master_unregister(&master->base) |
device_unregister(&master->dev) |
device_release |
//free master->base |
| i3c_master_do_daa(&master->base)
| //use master->base
Fix it by ensuring that the work is canceled before proceeding with
the cleanup in cdns_i3c_master_remove.
Signed-off-by: Kaixin Wang <kxwang23@m.fudan.edu.cn>
Link: https://lore.kernel.org/r/20240911153544.848398-1-kxwang23@m.fudan.edu.cn
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Diffstat (limited to 'tools/perf/scripts/python/call-graph-from-postgresql.py')
0 files changed, 0 insertions, 0 deletions