Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3398151pxf; Mon, 22 Mar 2021 05:38:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw0RrBKb737QRWvcDJNNd1YI4EHZ8kDXVsBgVzwFgXmk2uXXEezVyEbSQU1l2uvicwle+4/ X-Received: by 2002:a17:906:7e12:: with SMTP id e18mr19681726ejr.316.1616416733811; Mon, 22 Mar 2021 05:38:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616416733; cv=none; d=google.com; s=arc-20160816; b=GUIW0LIo+2z2ysWEX2oz8sSfHeCbdxKuerPguHA1EoAkpK4CqQVQ2MN+qgIYj0n9iT CWkt7Wv75ywgnEfHb1Tc2IUbdevcnTreCvOr6Np93pUezwm9MZzOFKO22I2Ghkge/p20 P3XsHQhqDGRJwLhXTQO2moZEumj78KY9bfZ50r/a2+G34TN+2mRYZbR4CELRmQHds5pA MX/X4RQtcn3en4IRA9cjeAQ/NwlOW/+Eiq5UW84n8+aGtntD0n/GeMPoNXlAxn6FqSGy b+EbqAC5FnoMzF/cwI9jNpqedaxgMZiK1rFlSRKW/hQv9fLSVa9e7YBBfkEDQBOOp33m hKIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=wCaIUvhWfMNDYfHreNpGyywVB4IKVtZiObX/lgeEXFE=; b=RYznUaw3Lv+oWtdEbyq6lKYO022oIEqxqGzV74Mkgcii8ZaGv3PM3blEr12E2DEo9g BG5pb86dRI+/gDlNK4lqEcAn5gArw/P/JToD4lArvKyM0W2F9JMEt45AeW8KYX+EPsVC cypMaQzSVH16QZtWHPOCU7xp2kVCmXfknuRIwT4xofwov8AhRgfjQvCHS2jMSFP0qeTk V+USp39w/QCfI4OZJ3tnoNqM6v9rR0UCnJD+kM7inkVR7pqRcF1piKuBkGBG+AQs3IY4 xTJXOfhJFSW2fDK7BSiOZnJS6NFioDirA2N/+cw2ph6KqE6myBYVlgrJr60tF2BHM8j7 iXVw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wo2jhq1q; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g14si10566762edr.362.2021.03.22.05.38.30; Mon, 22 Mar 2021 05:38:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wo2jhq1q; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231785AbhCVMfe (ORCPT + 99 others); Mon, 22 Mar 2021 08:35:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:55266 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231406AbhCVMcr (ORCPT ); Mon, 22 Mar 2021 08:32:47 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 60DE26199E; Mon, 22 Mar 2021 12:32:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1616416366; bh=m0x2fiiWRpm+GbCOB1gUeQYkZ1jaK5WjwHb/FPiolgY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wo2jhq1qg3M/JGBWDg69Q+sNylh9/TTmAlLx9NP0IAW7kxmQX3LY2e8PG8Mx07SFr E68IiZ50ujE6ZVlio2NusM8MzY+6xZ5JAv+I51maXBXUi6/50CMDjmwdCdySxAAWQo FGZPO2mPsFE0jUJVhDzxC/9iEyfEbA5P0SYli9ZQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jim Lin , Macpaul Lin Subject: [PATCH 5.11 080/120] usb: gadget: configfs: Fix KASAN use-after-free Date: Mon, 22 Mar 2021 13:27:43 +0100 Message-Id: <20210322121932.338646904@linuxfoundation.org> X-Mailer: git-send-email 2.31.0 In-Reply-To: <20210322121929.669628946@linuxfoundation.org> References: <20210322121929.669628946@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jim Lin commit 98f153a10da403ddd5e9d98a3c8c2bb54bb5a0b6 upstream. When gadget is disconnected, running sequence is like this. . composite_disconnect . Call trace: usb_string_copy+0xd0/0x128 gadget_config_name_configuration_store+0x4 gadget_config_name_attr_store+0x40/0x50 configfs_write_file+0x198/0x1f4 vfs_write+0x100/0x220 SyS_write+0x58/0xa8 . configfs_composite_unbind . configfs_composite_bind In configfs_composite_bind, it has "cn->strings.s = cn->configuration;" When usb_string_copy is invoked. it would allocate memory, copy input string, release previous pointed memory space, and use new allocated memory. When gadget is connected, host sends down request to get information. Call trace: usb_gadget_get_string+0xec/0x168 lookup_string+0x64/0x98 composite_setup+0xa34/0x1ee8 If gadget is disconnected and connected quickly, in the failed case, cn->configuration memory has been released by usb_string_copy kfree but configfs_composite_bind hasn't been run in time to assign new allocated "cn->configuration" pointer to "cn->strings.s". When "strlen(s->s) of usb_gadget_get_string is being executed, the dangling memory is accessed, "BUG: KASAN: use-after-free" error occurs. Cc: stable@vger.kernel.org Signed-off-by: Jim Lin Signed-off-by: Macpaul Lin Link: https://lore.kernel.org/r/1615444961-13376-1-git-send-email-macpaul.lin@mediatek.com Signed-off-by: Greg Kroah-Hartman --- drivers/usb/gadget/configfs.c | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) --- a/drivers/usb/gadget/configfs.c +++ b/drivers/usb/gadget/configfs.c @@ -97,6 +97,8 @@ struct gadget_config_name { struct list_head list; }; +#define USB_MAX_STRING_WITH_NULL_LEN (USB_MAX_STRING_LEN+1) + static int usb_string_copy(const char *s, char **s_copy) { int ret; @@ -106,12 +108,16 @@ static int usb_string_copy(const char *s if (ret > USB_MAX_STRING_LEN) return -EOVERFLOW; - str = kstrdup(s, GFP_KERNEL); - if (!str) - return -ENOMEM; + if (copy) { + str = copy; + } else { + str = kmalloc(USB_MAX_STRING_WITH_NULL_LEN, GFP_KERNEL); + if (!str) + return -ENOMEM; + } + strcpy(str, s); if (str[ret - 1] == '\n') str[ret - 1] = '\0'; - kfree(copy); *s_copy = str; return 0; }