aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorHui Peng <benquike@gmail.com>2018-12-03 16:09:34 +0100
committerTodd Kjos <tkjos@google.com>2019-10-04 14:40:44 -0700
commit9b3fe43de33b0631c1d600474c3bf38bff8e7efc (patch)
tree4338b5325ff1cc8fe7e987ac18d1587f5e000dad
parent43d63682b3da7e0a6adfdfb1b71d457e2ccc8684 (diff)
ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.cASB-2019-10-05_4.4-n-release
commit 5f8cf712582617d523120df67d392059eaf2fc4b upstream. If a USB sound card reports 0 interfaces, an error condition is triggered and the function usb_audio_probe errors out. In the error path, there was a use-after-free vulnerability where the memory object of the card was first freed, followed by a decrement of the number of active chips. Moving the decrement above the atomic_dec fixes the UAF. [ The original problem was introduced in 3.1 kernel, while it was developed in a different form. The Fixes tag below indicates the original commit but it doesn't mean that the patch is applicable cleanly. -- tiwai ] Fixes: 362e4e49abe5 ("ALSA: usb-audio - clear chip->probing on error exit") Reported-by: Hui Peng <benquike@gmail.com> Reported-by: Mathias Payer <mathias.payer@nebelwelt.net> Signed-off-by: Hui Peng <benquike@gmail.com> Signed-off-by: Mathias Payer <mathias.payer@nebelwelt.net> Cc: <stable@vger.kernel.org> Signed-off-by: Takashi Iwai <tiwai@suse.de> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--sound/usb/card.c5
1 files changed, 4 insertions, 1 deletions
diff --git a/sound/usb/card.c b/sound/usb/card.c
index 65f2ab117bf7..bda2177f2b23 100644
--- a/sound/usb/card.c
+++ b/sound/usb/card.c
@@ -590,9 +590,12 @@ static int usb_audio_probe(struct usb_interface *intf,
__error:
if (chip) {
+ /* chip->active is inside the chip->card object,
+ * decrement before memory is possibly returned.
+ */
+ atomic_dec(&chip->active);
if (!chip->num_interfaces)
snd_card_free(chip->card);
- atomic_dec(&chip->active);
}
mutex_unlock(&register_mutex);
return err;