ACK: [SRU][Artful][CVE-2017-17975][PATCH] media: usbtv: prevent double free in error case
Khaled Elmously
khalid.elmously at canonical.com
Thu Apr 19 14:45:24 UTC 2018
On 2018-04-19 16:02:40 , Kleber Souza wrote:
> From: Oliver Neukum <oneukum at suse.com>
>
> CVE-2017-17975
>
> Quoting the original report:
>
> It looks like there is a double-free vulnerability in Linux usbtv driver
> on an error path of usbtv_probe function. When audio registration fails,
> usbtv_video_free function ends up freeing usbtv data structure, which
> gets freed the second time under usbtv_video_fail label.
>
> usbtv_audio_fail:
>
> usbtv_video_free(usbtv); =>
>
> v4l2_device_put(&usbtv->v4l2_dev);
>
> => v4l2_device_put
>
> => kref_put
>
> => v4l2_device_release
>
> => usbtv_release (CALLBACK)
>
> => kfree(usbtv) (1st time)
>
> usbtv_video_fail:
>
> usb_set_intfdata(intf, NULL);
>
> usb_put_dev(usbtv->udev);
>
> kfree(usbtv); (2nd time)
>
> So, as we have refcounting, use it
>
> Reported-by: Yavuz, Tuba <tuba at ece.ufl.edu>
> Signed-off-by: Oliver Neukum <oneukum at suse.com>
> CC: stable at vger.kernel.org
> Signed-off-by: Hans Verkuil <hans.verkuil at cisco.com>
> Signed-off-by: Mauro Carvalho Chehab <mchehab at s-opensource.com>
> (cherry picked from commit 50e7044535537b2a54c7ab798cd34c7f6d900bd2)
> Signed-off-by: Kleber Sacilotto de Souza <kleber.souza at canonical.com>
> ---
> drivers/media/usb/usbtv/usbtv-core.c | 2 ++
> 1 file changed, 2 insertions(+)
>
> diff --git a/drivers/media/usb/usbtv/usbtv-core.c b/drivers/media/usb/usbtv/usbtv-core.c
> index ceb953be0770..720f8c15eea8 100644
> --- a/drivers/media/usb/usbtv/usbtv-core.c
> +++ b/drivers/media/usb/usbtv/usbtv-core.c
> @@ -112,6 +112,8 @@ static int usbtv_probe(struct usb_interface *intf,
> return 0;
>
> usbtv_audio_fail:
> + /* we must not free at this point */
> + usb_get_dev(usbtv->udev);
> usbtv_video_free(usbtv);
>
> usbtv_video_fail:
Acked-by: Khalid Elmously <khalid.elmously at canonical.com>
More information about the kernel-team
mailing list