lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <172658508687.68424.10453824473496378760.b4-ty@bootlin.com>
Date: Tue, 17 Sep 2024 16:58:51 +0200
From: Alexandre Belloni <alexandre.belloni@...tlin.com>
To: miquel.raynal@...tlin.com, Kaixin Wang <kxwang23@...udan.edu.cn>
Cc: 21210240012@...udan.edu.cn, 21302010073@...udan.edu.cn,
	conor.culhane@...vaco.com, linux-i3c@...ts.infradead.org,
	linux-kernel@...r.kernel.org, frank.li@....com,
	stable@...r.kernel.org
Subject: Re: [PATCH v3] i3c: master: svc: Fix use after free vulnerability in
 svc_i3c_master Driver Due to Race Condition

On Sun, 15 Sep 2024 00:39:33 +0800, Kaixin Wang wrote:
> In the svc_i3c_master_probe function, &master->hj_work is bound with
> svc_i3c_master_hj_work, &master->ibi_work is bound with
> svc_i3c_master_ibi_work. And svc_i3c_master_ibi_work  can start the
> hj_work, svc_i3c_master_irq_handler can start the ibi_work.
> 
> If we remove the module which will call svc_i3c_master_remove to
> make cleanup, it will free master->base through i3c_master_unregister
> while the work mentioned above will be used. The sequence of operations
> that may lead to a UAF bug is as follows:
> 
> [...]

Applied, thanks!

[1/1] i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition
      https://git.kernel.org/abelloni/c/618507257797

Best regards,

-- 
Alexandre Belloni, co-owner and COO, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ