Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3405936pxf; Mon, 22 Mar 2021 05:51:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyHHXNTJqFE2s08s5aubS5aaunYoZQVSttYTq0LPP0RWxhskLehlE78EsnEmMKmI423lyeK X-Received: by 2002:a50:e882:: with SMTP id f2mr25698369edn.184.1616417480136; Mon, 22 Mar 2021 05:51:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616417480; cv=none; d=google.com; s=arc-20160816; b=cAut6W+Y1ZZZ1jb6atsXMveg6Ohaxb/I13sj1Yf0oOMtpdazrJgMa7t9vMk6GB/Szq TaAVes6Oh4xkX7E/z19BTxThPTWyhtFGo7LtDCgltvrAo6xx8A4Bmwui4gTodTeN5seQ sTtFrXYsJRf+AJBpPNw4MzM9FlJZb4c0rGBBq0ksJT0cn/v86jicFphw46mOWHVPJOyH x4HIkAy7Rt2/yw3tf0TFm7FUbHe2au05tzm2+k6+8owAr2pgvam5mgVxxd9O4lqK9LUr wxxtBh/AiyaJk2stDQ6PzevNtqml6HT5wJARx0eMxOxsa5IMooFxyqb8kY2kmU6xCrn3 xF5w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=wCaIUvhWfMNDYfHreNpGyywVB4IKVtZiObX/lgeEXFE=; b=dRngnrqLqkH58KRIvxesq+vuJdAUnNFj38w/tCyTn2inIPvoDymx8bkpqxhYZfcWhw CsA7p61ZUl+Zqa8KgS91oyivsVrWQSVLXaA2gp+bjCpX+8HnultTad+eP2z1XXwH9jSr tjPhax4XNVjz+iuEHGf9Uo5x3L92lHg3CebIqsibi8BTi2Ty5ZBbhXh8nPrc8AU+3siZ LWcz6TDJDJpyDX5+/yNHtq0Q2FvLdhL+4ShF//0eP7/cvIVHYU/Gb/k2qsKu6S0e1W8O Bpdk2x2MEh2b4AIYIQ4JYwHJtotZp7LX/0VvNdTDqODqjdStVcH/zw42rPdXosjCHxQT cL2Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=mui8M1Bm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e9si11550227ejr.278.2021.03.22.05.50.57; Mon, 22 Mar 2021 05:51:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=mui8M1Bm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232254AbhCVMuQ (ORCPT + 99 others); Mon, 22 Mar 2021 08:50:16 -0400 Received: from mail.kernel.org ([198.145.29.99]:34646 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232177AbhCVMlV (ORCPT ); Mon, 22 Mar 2021 08:41:21 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 1AF3C619AB; Mon, 22 Mar 2021 12:39:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1616416776; bh=m0x2fiiWRpm+GbCOB1gUeQYkZ1jaK5WjwHb/FPiolgY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mui8M1Bm753crB83E0JQaUaddUvm1Aiu10vqyvWGQz7nQrbXhsWjrdPiTXFdCpXqB PlDaCSihSatfw/eTs7O2wYvKdMgzRZhKrKdR+eaotRzGT5hyG3Tubgc+lwFiuuhPps ElUg2CiP4kaoqwwxPgTaD/o4gcSg94ZAQg9Ly7mI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jim Lin , Macpaul Lin Subject: [PATCH 5.10 118/157] usb: gadget: configfs: Fix KASAN use-after-free Date: Mon, 22 Mar 2021 13:27:55 +0100 Message-Id: <20210322121937.509967454@linuxfoundation.org> X-Mailer: git-send-email 2.31.0 In-Reply-To: <20210322121933.746237845@linuxfoundation.org> References: <20210322121933.746237845@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jim Lin commit 98f153a10da403ddd5e9d98a3c8c2bb54bb5a0b6 upstream. When gadget is disconnected, running sequence is like this. . composite_disconnect . Call trace: usb_string_copy+0xd0/0x128 gadget_config_name_configuration_store+0x4 gadget_config_name_attr_store+0x40/0x50 configfs_write_file+0x198/0x1f4 vfs_write+0x100/0x220 SyS_write+0x58/0xa8 . configfs_composite_unbind . configfs_composite_bind In configfs_composite_bind, it has "cn->strings.s = cn->configuration;" When usb_string_copy is invoked. it would allocate memory, copy input string, release previous pointed memory space, and use new allocated memory. When gadget is connected, host sends down request to get information. Call trace: usb_gadget_get_string+0xec/0x168 lookup_string+0x64/0x98 composite_setup+0xa34/0x1ee8 If gadget is disconnected and connected quickly, in the failed case, cn->configuration memory has been released by usb_string_copy kfree but configfs_composite_bind hasn't been run in time to assign new allocated "cn->configuration" pointer to "cn->strings.s". When "strlen(s->s) of usb_gadget_get_string is being executed, the dangling memory is accessed, "BUG: KASAN: use-after-free" error occurs. Cc: stable@vger.kernel.org Signed-off-by: Jim Lin Signed-off-by: Macpaul Lin Link: https://lore.kernel.org/r/1615444961-13376-1-git-send-email-macpaul.lin@mediatek.com Signed-off-by: Greg Kroah-Hartman --- drivers/usb/gadget/configfs.c | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) --- a/drivers/usb/gadget/configfs.c +++ b/drivers/usb/gadget/configfs.c @@ -97,6 +97,8 @@ struct gadget_config_name { struct list_head list; }; +#define USB_MAX_STRING_WITH_NULL_LEN (USB_MAX_STRING_LEN+1) + static int usb_string_copy(const char *s, char **s_copy) { int ret; @@ -106,12 +108,16 @@ static int usb_string_copy(const char *s if (ret > USB_MAX_STRING_LEN) return -EOVERFLOW; - str = kstrdup(s, GFP_KERNEL); - if (!str) - return -ENOMEM; + if (copy) { + str = copy; + } else { + str = kmalloc(USB_MAX_STRING_WITH_NULL_LEN, GFP_KERNEL); + if (!str) + return -ENOMEM; + } + strcpy(str, s); if (str[ret - 1] == '\n') str[ret - 1] = '\0'; - kfree(copy); *s_copy = str; return 0; }