Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp2824931pxv; Mon, 12 Jul 2021 02:52:02 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxdcjOM50GC+1QO203RNP1ml4zB8mcTViKhtPTrNTDI1dR1caNLM6Dix2oLhB9xZwdUorZI X-Received: by 2002:a5e:8e44:: with SMTP id r4mr10161159ioo.124.1626083522412; Mon, 12 Jul 2021 02:52:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626083522; cv=none; d=google.com; s=arc-20160816; b=a+jto9WFXnLFeVrdyBD5/UHr56z1C62uGZ1705nbPL8EpUoiiFSuOyIZXDhSucsoBE v9iW3VmeJRimAP1242bnaScVdXDKifBNnQkz1Q5E/3pUdnQRq0BWt6HMvLj+mwtJP9P2 XH286hSZm1J0mbDvyY05V+nREmEKuOU5O6t5QUGKnlEFicaSc3RSSW2Z0+KFPAUlzZIO /vhTwxQajUfqJ8v/rNcpNM7uzUaJ5QupNI6GbFSXLt+/Yw4orAdPLwsLC5slrv+anpDy scypJL8U/lhpC1Fomlebu5l91sPeop6LIH0zf5IKRCrFOxJupfsEjO+ES4GSNgaGc18U knAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=nStKyGCEKbgs1EQIAxyhrQLzlgS2k+Do1atOm4EPhAQ=; b=ghKm1GlDwz0tshFwXE7Uh6qUN/hCHRmBmLrnRwNSBFMCqM3/0RtPwWVBQf7nO3WkNa 53ZFxyhhtY2HdlfjRdMkqFJh1EEMu1oSHKOeS+FQ2HpkfJHfIyw72cS+9GyGgyIlWThj qor4gZvB1TWp4CRmjxNYH8vvy3XjA72yG0nEHKTV8iqG80MBx7tKCTlwXKsy227v8S9p 1xcBOjCT3/ETra/iEOcIkYA7mB7vxpNd7IzGn7sLqTfcPO9tnN79FalULMGDw66HB2XH ZCaq+cAMLggFP6ABRTQ5pyCh6xFa0tb+pntS2DtbyD0FDLu+rENaDpz8xu68hJ1OTk0/ JMMw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=kqD1fc6l; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i23si1953270ila.157.2021.07.12.02.51.50; Mon, 12 Jul 2021 02:52:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=kqD1fc6l; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236708AbhGLGsK (ORCPT + 99 others); Mon, 12 Jul 2021 02:48:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:55500 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235816AbhGLGhJ (ORCPT ); Mon, 12 Jul 2021 02:37:09 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 05B0361158; Mon, 12 Jul 2021 06:33:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626071612; bh=+0RmVVSDzLNt2nkptVlfGz2MqVzeDxn8hiCZHkPC86c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kqD1fc6lZJQB9m7Rh19JQEi6JbnUsCyBdnNva74jXjt2sbIOCSqia55PCVP56mJKW G3avHnfwjclje1QMOvz1iTwHIsjL0Gaj+HAgqYW+0p7TcTgg7NcnTko8rPb7R9nhmC z7mPPpxAIEoEeHON1onpd7ZzIM/luAaBV22VJSvg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tong Zhang , Ulf Hansson , Sasha Levin Subject: [PATCH 5.10 143/593] memstick: rtsx_usb_ms: fix UAF Date: Mon, 12 Jul 2021 08:05:03 +0200 Message-Id: <20210712060858.795231132@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210712060843.180606720@linuxfoundation.org> References: <20210712060843.180606720@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tong Zhang [ Upstream commit 42933c8aa14be1caa9eda41f65cde8a3a95d3e39 ] This patch fixes the following issues: 1. memstick_free_host() will free the host, so the use of ms_dev(host) after it will be a problem. To fix this, move memstick_free_host() after when we are done with ms_dev(host). 2. In rtsx_usb_ms_drv_remove(), pm need to be disabled before we remove and free host otherwise memstick_check will be called and UAF will happen. [ 11.351173] BUG: KASAN: use-after-free in rtsx_usb_ms_drv_remove+0x94/0x140 [rtsx_usb_ms] [ 11.357077] rtsx_usb_ms_drv_remove+0x94/0x140 [rtsx_usb_ms] [ 11.357376] platform_remove+0x2a/0x50 [ 11.367531] Freed by task 298: [ 11.368537] kfree+0xa4/0x2a0 [ 11.368711] device_release+0x51/0xe0 [ 11.368905] kobject_put+0xa2/0x120 [ 11.369090] rtsx_usb_ms_drv_remove+0x8c/0x140 [rtsx_usb_ms] [ 11.369386] platform_remove+0x2a/0x50 [ 12.038408] BUG: KASAN: use-after-free in __mutex_lock.isra.0+0x3ec/0x7c0 [ 12.045432] mutex_lock+0xc9/0xd0 [ 12.046080] memstick_check+0x6a/0x578 [memstick] [ 12.046509] process_one_work+0x46d/0x750 [ 12.052107] Freed by task 297: [ 12.053115] kfree+0xa4/0x2a0 [ 12.053272] device_release+0x51/0xe0 [ 12.053463] kobject_put+0xa2/0x120 [ 12.053647] rtsx_usb_ms_drv_remove+0xc4/0x140 [rtsx_usb_ms] [ 12.053939] platform_remove+0x2a/0x50 Signed-off-by: Tong Zhang Co-developed-by: Ulf Hansson Link: https://lore.kernel.org/r/20210511163944.1233295-1-ztong0001@gmail.com Signed-off-by: Ulf Hansson Signed-off-by: Sasha Levin --- drivers/memstick/host/rtsx_usb_ms.c | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/drivers/memstick/host/rtsx_usb_ms.c b/drivers/memstick/host/rtsx_usb_ms.c index 102dbb8080da..29271ad4728a 100644 --- a/drivers/memstick/host/rtsx_usb_ms.c +++ b/drivers/memstick/host/rtsx_usb_ms.c @@ -799,9 +799,9 @@ static int rtsx_usb_ms_drv_probe(struct platform_device *pdev) return 0; err_out: - memstick_free_host(msh); pm_runtime_disable(ms_dev(host)); pm_runtime_put_noidle(ms_dev(host)); + memstick_free_host(msh); return err; } @@ -828,9 +828,6 @@ static int rtsx_usb_ms_drv_remove(struct platform_device *pdev) } mutex_unlock(&host->host_mutex); - memstick_remove_host(msh); - memstick_free_host(msh); - /* Balance possible unbalanced usage count * e.g. unconditional module removal */ @@ -838,10 +835,11 @@ static int rtsx_usb_ms_drv_remove(struct platform_device *pdev) pm_runtime_put(ms_dev(host)); pm_runtime_disable(ms_dev(host)); - platform_set_drvdata(pdev, NULL); - + memstick_remove_host(msh); dev_dbg(ms_dev(host), ": Realtek USB Memstick controller has been removed\n"); + memstick_free_host(msh); + platform_set_drvdata(pdev, NULL); return 0; } -- 2.30.2