Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp2706369pxv; Sun, 11 Jul 2021 23:19:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxnwbe+k7X+alKyQFYRx5ADs1CvXPw8zM6od74rtNsf+Jux6jpA8AhW+zzizafjKZ3zgifi X-Received: by 2002:a02:cba8:: with SMTP id v8mr42945327jap.111.1626070782427; Sun, 11 Jul 2021 23:19:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626070782; cv=none; d=google.com; s=arc-20160816; b=IFp1vhKxL//gnqJrfYxel7VJF0ToJcqqUXPfcL9A/TtMBCrR8VGWa8vuI1nqZaaO+d f5ZfuYGrDj6yHXxR8CwKp+XoUf4gbbY3bF00uCSIKTwnyjhHrMZRwZ363/GC2ssXCB3d eCQFfNPd3H9LkS4kkeQNktMscsRJEirTkh4PUpNKcALEzkcVxZQb+rYHd+sEj8X72Fru VFGyy4UYIBE2o39/9uY9xphx/0p40Vg+1Ai3f2g+w5BK/jqupYbcPfeYIlBy0+ug5sNz DSSNx4jE5xY3jp48NFDIn3F51bAZrE1JKXE7fzuRtJLZCqPcKUgTIz8YRlreCyMLcsIa mH3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=nStKyGCEKbgs1EQIAxyhrQLzlgS2k+Do1atOm4EPhAQ=; b=xgIFZzrKHZVHDf7+XM+4Nwhhtzf4uy1IOIBJ4N9pQn/QIU8PclH6QezMlGK+cLa1qW abwOONqJoRkKMg5xp6pbIbH1E0iXQgjhuC6QoYX1lF0GbxEpNq15EBpLq0FcAPUJMSjQ SF5gblvLfI0FmimG852O+42gnzkvJiciRu4KgZipC7i6235uW5BJquu00PpqMkUhiPi5 5YvijYluOc6x6kZYuVIMs3cOHYaJTv09/2nlUNaOlMVyZgPQSI1NKdKC0Q7+2kS3A+qF bL3Z/GXdBJIpH6sjm0/vb+gdTRbhVK46SxM6n+XIihPm2Z9ql36dboMmET6IMeW+BD9B llPw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=T4qKT6nV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b15si12331549ilj.38.2021.07.11.23.19.30; Sun, 11 Jul 2021 23:19:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=T4qKT6nV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233779AbhGLGVt (ORCPT + 99 others); Mon, 12 Jul 2021 02:21:49 -0400 Received: from mail.kernel.org ([198.145.29.99]:40158 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234252AbhGLGUn (ORCPT ); Mon, 12 Jul 2021 02:20:43 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 647AC61107; Mon, 12 Jul 2021 06:17:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626070675; bh=+0RmVVSDzLNt2nkptVlfGz2MqVzeDxn8hiCZHkPC86c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=T4qKT6nVfCQFjOiCgOsuBLPdZ0s5oS0rnHX9849rKOQzGs9411ON2UePKl6Oze+UW 4oFGqEoe+psBGO1XgO4+D2NQZKu3xUt9CXGdqNpfZqeuyWIZpTcglRNGmrd71douHK MfS6Y0pqjKvniaafWWqMYYQxA8Lj8P3OBkdjiFk0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tong Zhang , Ulf Hansson , Sasha Levin Subject: [PATCH 5.4 092/348] memstick: rtsx_usb_ms: fix UAF Date: Mon, 12 Jul 2021 08:07:56 +0200 Message-Id: <20210712060713.946521111@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210712060659.886176320@linuxfoundation.org> References: <20210712060659.886176320@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tong Zhang [ Upstream commit 42933c8aa14be1caa9eda41f65cde8a3a95d3e39 ] This patch fixes the following issues: 1. memstick_free_host() will free the host, so the use of ms_dev(host) after it will be a problem. To fix this, move memstick_free_host() after when we are done with ms_dev(host). 2. In rtsx_usb_ms_drv_remove(), pm need to be disabled before we remove and free host otherwise memstick_check will be called and UAF will happen. [ 11.351173] BUG: KASAN: use-after-free in rtsx_usb_ms_drv_remove+0x94/0x140 [rtsx_usb_ms] [ 11.357077] rtsx_usb_ms_drv_remove+0x94/0x140 [rtsx_usb_ms] [ 11.357376] platform_remove+0x2a/0x50 [ 11.367531] Freed by task 298: [ 11.368537] kfree+0xa4/0x2a0 [ 11.368711] device_release+0x51/0xe0 [ 11.368905] kobject_put+0xa2/0x120 [ 11.369090] rtsx_usb_ms_drv_remove+0x8c/0x140 [rtsx_usb_ms] [ 11.369386] platform_remove+0x2a/0x50 [ 12.038408] BUG: KASAN: use-after-free in __mutex_lock.isra.0+0x3ec/0x7c0 [ 12.045432] mutex_lock+0xc9/0xd0 [ 12.046080] memstick_check+0x6a/0x578 [memstick] [ 12.046509] process_one_work+0x46d/0x750 [ 12.052107] Freed by task 297: [ 12.053115] kfree+0xa4/0x2a0 [ 12.053272] device_release+0x51/0xe0 [ 12.053463] kobject_put+0xa2/0x120 [ 12.053647] rtsx_usb_ms_drv_remove+0xc4/0x140 [rtsx_usb_ms] [ 12.053939] platform_remove+0x2a/0x50 Signed-off-by: Tong Zhang Co-developed-by: Ulf Hansson Link: https://lore.kernel.org/r/20210511163944.1233295-1-ztong0001@gmail.com Signed-off-by: Ulf Hansson Signed-off-by: Sasha Levin --- drivers/memstick/host/rtsx_usb_ms.c | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/drivers/memstick/host/rtsx_usb_ms.c b/drivers/memstick/host/rtsx_usb_ms.c index 102dbb8080da..29271ad4728a 100644 --- a/drivers/memstick/host/rtsx_usb_ms.c +++ b/drivers/memstick/host/rtsx_usb_ms.c @@ -799,9 +799,9 @@ static int rtsx_usb_ms_drv_probe(struct platform_device *pdev) return 0; err_out: - memstick_free_host(msh); pm_runtime_disable(ms_dev(host)); pm_runtime_put_noidle(ms_dev(host)); + memstick_free_host(msh); return err; } @@ -828,9 +828,6 @@ static int rtsx_usb_ms_drv_remove(struct platform_device *pdev) } mutex_unlock(&host->host_mutex); - memstick_remove_host(msh); - memstick_free_host(msh); - /* Balance possible unbalanced usage count * e.g. unconditional module removal */ @@ -838,10 +835,11 @@ static int rtsx_usb_ms_drv_remove(struct platform_device *pdev) pm_runtime_put(ms_dev(host)); pm_runtime_disable(ms_dev(host)); - platform_set_drvdata(pdev, NULL); - + memstick_remove_host(msh); dev_dbg(ms_dev(host), ": Realtek USB Memstick controller has been removed\n"); + memstick_free_host(msh); + platform_set_drvdata(pdev, NULL); return 0; } -- 2.30.2