From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id ED046308F0B; Mon, 13 Oct 2025 14:49:23 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760366964; cv=none; b=Qc9MeqPcG48pc+2ZB9u9ACqSSr5zYfl9SzLIjmAqfy/gvWsD1LR3nwwUpSvowVJ3yJtj69asnVuZOWGZubbTllYIJpnflj8br6t2dAqpGAAyCtoGnrf0RLzlUq9zZxdW251gOQ7w17cuocEPP6im5bfjql+22CP6TZ+tk6QWlN8= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760366964; c=relaxed/simple; bh=awBKnoXDe2L+IYIHCsd0osFWqzYnT5PC8zTJ/cBqKMk=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=e43BBvaBjUGSnpIDKH1BPXoyOm/icr28KYTBz8Wo5E7c1/kG0Zh1hnSfEeCBGHfV6gXNf1WELDlPeuLO4j2wejjuZUdl5hQ9JOCCbYyKMiFeQnZ+0FD+VsNawP4bkoivZugrrgrCCVSPi74wpLm1eTWNWL/vlJUu/YcdrwsqH+o= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=RpUCTM9v; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="RpUCTM9v" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 30959C4CEE7; Mon, 13 Oct 2025 14:49:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1760366963; bh=awBKnoXDe2L+IYIHCsd0osFWqzYnT5PC8zTJ/cBqKMk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RpUCTM9vEBGsycmdmSGXPC1KGlNxe5bPFE85GrinpqlZnmk9IdCUXs3uhq7NAB9F8 hwsQxgUFUzt1F5iniUd7BloBCdWrZrjVhoF4q+vv6OTyJ00bkCduBWV7UUILSO+WmI igwrIQwcJ43BRNk5MrGSUdd0bnjCIISY7pr75hY4= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Duoming Zhou , Hans Verkuil , Sasha Levin Subject: [PATCH 6.1 017/196] media: tuner: xc5000: Fix use-after-free in xc5000_release Date: Mon, 13 Oct 2025 16:43:10 +0200 Message-ID: <20251013144315.191628841@linuxfoundation.org> X-Mailer: git-send-email 2.51.0 In-Reply-To: <20251013144314.549284796@linuxfoundation.org> References: <20251013144314.549284796@linuxfoundation.org> User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 6.1-stable review patch. If anyone has any objections, please let me know. ------------------ From: Duoming Zhou [ Upstream commit 40b7a19f321e65789612ebaca966472055dab48c ] The original code uses cancel_delayed_work() in xc5000_release(), which does not guarantee that the delayed work item timer_sleep has fully completed if it was already running. This leads to use-after-free scenarios where xc5000_release() may free the xc5000_priv while timer_sleep is still active and attempts to dereference the xc5000_priv. A typical race condition is illustrated below: CPU 0 (release thread) | CPU 1 (delayed work callback) xc5000_release() | xc5000_do_timer_sleep() cancel_delayed_work() | hybrid_tuner_release_state(priv) | kfree(priv) | | priv = container_of() // UAF Replace cancel_delayed_work() with cancel_delayed_work_sync() to ensure that the timer_sleep is properly canceled before the xc5000_priv memory is deallocated. A deadlock concern was considered: xc5000_release() is called in a process context and is not holding any locks that the timer_sleep work item might also need. Therefore, the use of the _sync() variant is safe here. This bug was initially identified through static analysis. Fixes: f7a27ff1fb77 ("[media] xc5000: delay tuner sleep to 5 seconds") Cc: stable@vger.kernel.org Signed-off-by: Duoming Zhou Signed-off-by: Hans Verkuil [hverkuil: fix typo in Subject: tunner -> tuner] Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/media/tuners/xc5000.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/media/tuners/xc5000.c +++ b/drivers/media/tuners/xc5000.c @@ -1304,7 +1304,7 @@ static void xc5000_release(struct dvb_fr mutex_lock(&xc5000_list_mutex); if (priv) { - cancel_delayed_work(&priv->timer_sleep); + cancel_delayed_work_sync(&priv->timer_sleep); hybrid_tuner_release_state(priv); }