[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20251021131625.2707245-1-Victoria.Votokina@kaspersky.com>
Date: Tue, 21 Oct 2025 16:16:24 +0300
From: Victoria Votokina <Victoria.Votokina@...persky.com>
To: Parthiban Veerasooran <parthiban.veerasooran@...rochip.com>
CC: Victoria Votokina <Victoria.Votokina@...persky.com>, Christian Gromm
<christian.gromm@...rochip.com>, Greg Kroah-Hartman
<gregkh@...uxfoundation.org>, <linux-kernel@...r.kernel.org>,
<lvc-project@...uxtesting.org>, <Oleg.Kazakov@...persky.com>,
<syzbot+916742d5d24f6c254761@...kaller.appspotmail.com>
Subject: [PATCH v2 1/2] most: usb: fix use-after-free/double-free in hdm_disconnect
hdm_disconnect() calls most_deregister_interface(), which eventually
unregisters the MOST interface device with device_unregister(iface->dev).
If that drops the last reference, the device core may call release_mdev()
immediately while hdm_disconnect() is still executing.
The old code also freed several mdev-owned allocations in
hdm_disconnect() and then performed additional put_device() calls.
Depending on refcount order, this could lead to use-after-free or
double-free when release_mdev() ran (or when unregister paths also
performed puts).
Fix by moving the frees of mdev-owned allocations into release_mdev(),
so they happen exactly once when the device is truly released, and by
dropping the extra put_device() calls in hdm_disconnect() that are
redundant after device_unregister() and most_deregister_interface().
This addresses the KASAN slab-use-after-free reported by syzbot in
hdm_disconnect(). See report and stack traces in the bug link below.
Reported-by: syzbot+916742d5d24f6c254761@...kaller.appspotmail.com
Link: https://syzkaller.appspot.com/bug?extid=916742d5d24f6c254761
Fixes: 97a6f772f36b ("drivers: most: add USB adapter driver")
Signed-off-by: Victoria Votokina <Victoria.Votokina@...persky.com>
---
v2: Nothing changed
drivers/most/most_usb.c | 11 ++++-------
1 file changed, 4 insertions(+), 7 deletions(-)
diff --git a/drivers/most/most_usb.c b/drivers/most/most_usb.c
index cf5be9c449a55..3d8163bb7b46d 100644
--- a/drivers/most/most_usb.c
+++ b/drivers/most/most_usb.c
@@ -929,6 +929,10 @@ static void release_mdev(struct device *dev)
{
struct most_dev *mdev = to_mdev_from_dev(dev);
+ kfree(mdev->busy_urbs);
+ kfree(mdev->cap);
+ kfree(mdev->conf);
+ kfree(mdev->ep_address);
kfree(mdev);
}
/**
@@ -1121,13 +1125,6 @@ static void hdm_disconnect(struct usb_interface *interface)
if (mdev->dci)
device_unregister(&mdev->dci->dev);
most_deregister_interface(&mdev->iface);
-
- kfree(mdev->busy_urbs);
- kfree(mdev->cap);
- kfree(mdev->conf);
- kfree(mdev->ep_address);
- put_device(&mdev->dci->dev);
- put_device(&mdev->dev);
}
static int hdm_suspend(struct usb_interface *interface, pm_message_t message)
--
2.30.2
Powered by blists - more mailing lists