diff mbox series

net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition

Message ID 20240909175821.2047-1-kxwang23@m.fudan.edu.cn (mailing list archive)
State Superseded
Delegated to: Netdev Maintainers
Headers show
Series net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition | expand

Checks

Context Check Description
netdev/series_format warning Single patches do not need cover letters; Target tree name not specified in the subject
netdev/tree_selection success Guessed tree name to be net-next
netdev/ynl success Generated files up to date; no warnings/errors; no diff in generated;
netdev/fixes_present success Fixes tag not required for -next series
netdev/header_inline success No static functions without inline keyword in header files
netdev/build_32bit success Errors and warnings before: 7 this patch: 7
netdev/build_tools success No tools touched, skip
netdev/cc_maintainers warning 3 maintainers not CCed: pabeni@redhat.com linux-arm-kernel@lists.infradead.org linux@armlinux.org.uk
netdev/build_clang success Errors and warnings before: 7 this patch: 7
netdev/verify_signedoff success Signed-off-by tag matches author and committer
netdev/deprecated_api success None detected
netdev/check_selftest success No net selftest shell script
netdev/verify_fixes success No Fixes tag
netdev/build_allmodconfig_warn success Errors and warnings before: 7 this patch: 7
netdev/checkpatch success total: 0 errors, 0 warnings, 0 checks, 7 lines checked
netdev/build_clang_rust success No Rust files in patch. Skipping build
netdev/kdoc success Errors and warnings before: 0 this patch: 0
netdev/source_inline success Was 0 now: 0
netdev/contest success net-next-2024-09-10--06-00 (tests: 722)

Commit Message

Kaixin Wang Sept. 9, 2024, 5:58 p.m. UTC
In the ether3_probe function, a timer is initialized with a callback
function ether3_ledoff, bound to &prev(dev)->timer. Once the timer is
started, there is a risk of a race condition if the module or device
is removed, triggering the ether3_remove function to perform cleanup.
The sequence of operations that may lead to a UAF bug is as follows:

CPU0                                    CPU1

                      |  ether3_ledoff
ether3_remove         |
  free_netdev(dev);   |
  put_devic           |
  kfree(dev);         |
 |  ether3_outw(priv(dev)->regs.config2 |= CFG2_CTRLO, REG_CONFIG2);
                      | // use dev

Fix it by ensuring that the timer is canceled before proceeding with
the cleanup in ether3_remove.

Signed-off-by: Kaixin Wang <kxwang23@m.fudan.edu.cn>
---
 drivers/net/ethernet/seeq/ether3.c | 1 +
 1 file changed, 1 insertion(+)

Comments

Przemek Kitszel Sept. 11, 2024, 9:29 a.m. UTC | #1
On 9/9/24 19:58, Kaixin Wang wrote:
> In the ether3_probe function, a timer is initialized with a callback
> function ether3_ledoff, bound to &prev(dev)->timer. Once the timer is
> started, there is a risk of a race condition if the module or device
> is removed, triggering the ether3_remove function to perform cleanup.
> The sequence of operations that may lead to a UAF bug is as follows:
> 
> CPU0                                    CPU1
> 
>                        |  ether3_ledoff
> ether3_remove         |
>    free_netdev(dev);   |
>    put_devic           |
>    kfree(dev);         |
>   |  ether3_outw(priv(dev)->regs.config2 |= CFG2_CTRLO, REG_CONFIG2);
>                        | // use dev
> 
> Fix it by ensuring that the timer is canceled before proceeding with
> the cleanup in ether3_remove.

this code change indeed prevents UAF bug
but as is, the CFG2_CTRLO flag of REG_CONFIG2 will be left in state "ON"

it would be better to first turn the LED off unconditionally

> 
> Signed-off-by: Kaixin Wang <kxwang23@m.fudan.edu.cn>
> ---
>   drivers/net/ethernet/seeq/ether3.c | 1 +
>   1 file changed, 1 insertion(+)
> 
> diff --git a/drivers/net/ethernet/seeq/ether3.c b/drivers/net/ethernet/seeq/ether3.c
> index c672f92d65e9..f9d27c9d6808 100644
> --- a/drivers/net/ethernet/seeq/ether3.c
> +++ b/drivers/net/ethernet/seeq/ether3.c
> @@ -850,6 +850,7 @@ static void ether3_remove(struct expansion_card *ec)
>   	ecard_set_drvdata(ec, NULL);
>   
>   	unregister_netdev(dev);
> +	del_timer_sync(&priv(dev)->timer);
>   	free_netdev(dev);
>   	ecard_release_resources(ec);
>   }
Kaixin Wang Sept. 12, 2024, 4:46 p.m. UTC | #2
At 2024-09-11 17:29:44, "Przemek Kitszel" <przemyslaw.kitszel@intel.com> wrote:
>On 9/9/24 19:58, Kaixin Wang wrote:
>> In the ether3_probe function, a timer is initialized with a callback
>> function ether3_ledoff, bound to &prev(dev)->timer. Once the timer is
>> started, there is a risk of a race condition if the module or device
>> is removed, triggering the ether3_remove function to perform cleanup.
>> The sequence of operations that may lead to a UAF bug is as follows:
>> 
>> CPU0                                    CPU1
>> 
>>                        |  ether3_ledoff
>> ether3_remove         |
>>    free_netdev(dev);   |
>>    put_devic           |
>>    kfree(dev);         |
>>   |  ether3_outw(priv(dev)->regs.config2 |= CFG2_CTRLO, REG_CONFIG2);
>>                        | // use dev
>> 
>> Fix it by ensuring that the timer is canceled before proceeding with
>> the cleanup in ether3_remove.
>
>this code change indeed prevents UAF bug
>but as is, the CFG2_CTRLO flag of REG_CONFIG2 will be left in state "ON"
>
>it would be better to first turn the LED off unconditionally
>

I will fix it in the next version of patch.

>> 
>> Signed-off-by: Kaixin Wang <kxwang23@m.fudan.edu.cn>
>> ---
>>   drivers/net/ethernet/seeq/ether3.c | 1 +
>>   1 file changed, 1 insertion(+)
>> 
>> diff --git a/drivers/net/ethernet/seeq/ether3.c b/drivers/net/ethernet/seeq/ether3.c
>> index c672f92d65e9..f9d27c9d6808 100644
>> --- a/drivers/net/ethernet/seeq/ether3.c
>> +++ b/drivers/net/ethernet/seeq/ether3.c
>> @@ -850,6 +850,7 @@ static void ether3_remove(struct expansion_card *ec)
>>   	ecard_set_drvdata(ec, NULL);
>>   
>>   	unregister_netdev(dev);
>> +	del_timer_sync(&priv(dev)->timer);
>>   	free_netdev(dev);
>>   	ecard_release_resources(ec);
>>   }
>
>
Thanks for the review!

Best regards,
Kaixin Wang
Simon Horman Sept. 13, 2024, 11:37 a.m. UTC | #3
On Tue, Sep 10, 2024 at 01:58:21AM +0800, Kaixin Wang wrote:
> In the ether3_probe function, a timer is initialized with a callback
> function ether3_ledoff, bound to &prev(dev)->timer. Once the timer is
> started, there is a risk of a race condition if the module or device
> is removed, triggering the ether3_remove function to perform cleanup.
> The sequence of operations that may lead to a UAF bug is as follows:
> 
> CPU0                                    CPU1
> 
>                       |  ether3_ledoff
> ether3_remove         |
>   free_netdev(dev);   |
>   put_devic           |
>   kfree(dev);         |
>  |  ether3_outw(priv(dev)->regs.config2 |= CFG2_CTRLO, REG_CONFIG2);
>                       | // use dev
> 
> Fix it by ensuring that the timer is canceled before proceeding with
> the cleanup in ether3_remove.
> 
> Signed-off-by: Kaixin Wang <kxwang23@m.fudan.edu.cn>

This seems like it is a bug fix to me.  If so, it should have a Fixes tag
(immediately above your Signed-off-by line, no blank line in between). And
be targeted at net.

	Subject: [PATCH net] ...

Unless the bug only exists in net-next.

	Subject: [PATCH net-next] ...

Link: https://docs.kernel.org/process/maintainer-netdev.html

...
diff mbox series

Patch

diff --git a/drivers/net/ethernet/seeq/ether3.c b/drivers/net/ethernet/seeq/ether3.c
index c672f92d65e9..f9d27c9d6808 100644
--- a/drivers/net/ethernet/seeq/ether3.c
+++ b/drivers/net/ethernet/seeq/ether3.c
@@ -850,6 +850,7 @@  static void ether3_remove(struct expansion_card *ec)
 	ecard_set_drvdata(ec, NULL);
 
 	unregister_netdev(dev);
+	del_timer_sync(&priv(dev)->timer);
 	free_netdev(dev);
 	ecard_release_resources(ec);
 }