kernel_samsung_a53x/drivers/media/dvb-core
Zhipeng Lu a0eab8dd81 media: edia: dvbdev: fix a use-after-free
[ Upstream commit 8c64f4cdf4e6cc5682c52523713af8c39c94e6d5 ]

In dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed
in several error-handling paths. However, *pdvbdev is not set to NULL
after dvbdev's deallocation, causing use-after-frees in many places,
for example, in the following call chain:

budget_register
  |-> dvb_dmxdev_init
        |-> dvb_register_device
  |-> dvb_dmxdev_release
        |-> dvb_unregister_device
              |-> dvb_remove_device
                    |-> dvb_device_put
                          |-> kref_put

When calling dvb_unregister_device, dmxdev->dvbdev (i.e. *pdvbdev in
dvb_register_device) could point to memory that had been freed in
dvb_register_device. Thereafter, this pointer is transferred to
kref_put and triggering a use-after-free.

Link: https://lore.kernel.org/linux-media/20240203134046.3120099-1-alexious@zju.edu.cn
Fixes: b61901024776 ("V4L/DVB (5244): Dvbdev: fix illegal re-usage of fileoperations struct")
Signed-off-by: Zhipeng Lu <alexious@zju.edu.cn>
Signed-off-by: Mauro Carvalho Chehab <mchehab@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-11-19 08:44:52 +01:00
..
dmxdev.c Import A536BXXU9EXDC 2024-06-15 16:02:09 -03:00
dvb_ca_en50221.c Import A536BXXU9EXDC 2024-06-15 16:02:09 -03:00
dvb_demux.c Import A536BXXU9EXDC 2024-06-15 16:02:09 -03:00
dvb_frontend.c Import A536BXXU9EXDC 2024-06-15 16:02:09 -03:00
dvb_math.c Import A536BXXU9EXDC 2024-06-15 16:02:09 -03:00
dvb_net.c Import A536BXXU9EXDC 2024-06-15 16:02:09 -03:00
dvb_ringbuffer.c Import A536BXXU9EXDC 2024-06-15 16:02:09 -03:00
dvb_vb2.c Import A536BXXU9EXDC 2024-06-15 16:02:09 -03:00
dvbdev.c media: edia: dvbdev: fix a use-after-free 2024-11-19 08:44:52 +01:00
Kconfig Import A536BXXU9EXDC 2024-06-15 16:02:09 -03:00
Makefile Import A536BXXU9EXDC 2024-06-15 16:02:09 -03:00