]> git.baikalelectronics.ru Git - kernel.git/commit
ubi: Fix possible null-ptr-deref in ubi_free_volume()
authorYang Yingliang <yangyingliang@huawei.com>
Mon, 14 Nov 2022 10:26:24 +0000 (18:26 +0800)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 11 Mar 2023 12:55:20 +0000 (13:55 +0100)
commit7ff89bf050e2de19169d0ec350f3508b49e8256a
tree91f26312b5a39a79412d3c963145d13b955bed38
parent69de2bd6f424a7aedfb620079155f1faf895e54d
ubi: Fix possible null-ptr-deref in ubi_free_volume()

[ Upstream commit 286d4d23ab0e7853fc1b7db7d28a5ea718185fe1 ]

It willl cause null-ptr-deref in the following case:

uif_init()
  ubi_add_volume()
    cdev_add() -> if it fails, call kill_volumes()
    device_register()

kill_volumes() -> if ubi_add_volume() fails call this function
  ubi_free_volume()
    cdev_del()
    device_unregister() -> trying to delete a not added device,
   it causes null-ptr-deref

So in ubi_free_volume(), it delete devices whether they are added
or not, it will causes null-ptr-deref.

Handle the error case whlie calling ubi_add_volume() to fix this
problem. If add volume fails, set the corresponding vol to null,
so it can not be accessed in kill_volumes() and release the
resource in ubi_add_volume() error path.

Fixes: 8170740f4ed1 ("UBI: Unsorted Block Images")
Suggested-by: Zhihao Cheng <chengzhihao1@huawei.com>
Signed-off-by: Yang Yingliang <yangyingliang@huawei.com>
Reviewed-by: Zhihao Cheng <chengzhihao1@huawei.com>
Signed-off-by: Richard Weinberger <richard@nod.at>
Signed-off-by: Sasha Levin <sashal@kernel.org>
drivers/mtd/ubi/build.c
drivers/mtd/ubi/vmt.c