From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 452BB32ED43; Mon, 27 Oct 2025 18:50:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1761591014; cv=none; b=qXN1ERe40Bpj0osaCn469q3GRyDE5yWrHmaMvApFDknDb1SDqvATGEa60f8XjepeOwLS4YDVy17ECBjxwBnvDCOgbHaW5XDIIOkbKn/mjNAvld5E27YUnqKjVoDbSOVMl/ttAwnraToNiWL6jipqO42MjWDa0Rw9KukU72MZjQ4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1761591014; c=relaxed/simple; bh=QRaWTwUGMUYb7iRXc5MQdM2aj1Gzv9gBAVJpKYMxqkQ=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=UlD14ZoEcQorn1a1Zcr5V6tm6zZ1Uf1V3OVuUlg3KiJCzWnSQmpORm5VBRljQd8XTS4fIh61XkKQ8j4m3OcrlLVb12Ww9EX80Azpn3WdzjHtQGURuOELnW7+XNFn7xHBzikd6Y2M/+9yl18Q0YgkslpX1DH7RZdxhY+qtMa98fE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=ENZUx9Eq; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="ENZUx9Eq" Received: by smtp.kernel.org (Postfix) with ESMTPSA id C2FBBC4CEFD; Mon, 27 Oct 2025 18:50:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1761591014; bh=QRaWTwUGMUYb7iRXc5MQdM2aj1Gzv9gBAVJpKYMxqkQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ENZUx9Equgw1320V6+qxfx4v1bxW6hifT6qSaxa517/f90Kfk7GIxuEuyXaDAtyaK J0chMTSNXwh2dqvf4TlVPegOzNn/SS9MFljn5agGmGMQTjS9RMdZ2xHw9EIBUEaJ/R EwfguFoiDCMiwHP+alKOZKn9Wv+6qPgmoYSc42Zk= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Duoming Zhou , Hans Verkuil , Sasha Levin Subject: [PATCH 5.10 006/332] media: tuner: xc5000: Fix use-after-free in xc5000_release Date: Mon, 27 Oct 2025 19:30:59 +0100 Message-ID: <20251027183524.786477583@linuxfoundation.org> X-Mailer: git-send-email 2.51.1 In-Reply-To: <20251027183524.611456697@linuxfoundation.org> References: <20251027183524.611456697@linuxfoundation.org> User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 5.10-stable review patch. If anyone has any objections, please let me know. ------------------ From: Duoming Zhou [ Upstream commit 40b7a19f321e65789612ebaca966472055dab48c ] The original code uses cancel_delayed_work() in xc5000_release(), which does not guarantee that the delayed work item timer_sleep has fully completed if it was already running. This leads to use-after-free scenarios where xc5000_release() may free the xc5000_priv while timer_sleep is still active and attempts to dereference the xc5000_priv. A typical race condition is illustrated below: CPU 0 (release thread) | CPU 1 (delayed work callback) xc5000_release() | xc5000_do_timer_sleep() cancel_delayed_work() | hybrid_tuner_release_state(priv) | kfree(priv) | | priv = container_of() // UAF Replace cancel_delayed_work() with cancel_delayed_work_sync() to ensure that the timer_sleep is properly canceled before the xc5000_priv memory is deallocated. A deadlock concern was considered: xc5000_release() is called in a process context and is not holding any locks that the timer_sleep work item might also need. Therefore, the use of the _sync() variant is safe here. This bug was initially identified through static analysis. Fixes: f7a27ff1fb77 ("[media] xc5000: delay tuner sleep to 5 seconds") Cc: stable@vger.kernel.org Signed-off-by: Duoming Zhou Signed-off-by: Hans Verkuil [hverkuil: fix typo in Subject: tunner -> tuner] Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/media/tuners/xc5000.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/media/tuners/xc5000.c +++ b/drivers/media/tuners/xc5000.c @@ -1304,7 +1304,7 @@ static void xc5000_release(struct dvb_fr mutex_lock(&xc5000_list_mutex); if (priv) { - cancel_delayed_work(&priv->timer_sleep); + cancel_delayed_work_sync(&priv->timer_sleep); hybrid_tuner_release_state(priv); }