]> git.baikalelectronics.ru Git - kernel.git/commitdiff
ipmi: fix use after free in _ipmi_destroy_user()
authorDan Carpenter <error27@gmail.com>
Tue, 15 Nov 2022 13:17:43 +0000 (16:17 +0300)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 18 Jan 2023 10:41:49 +0000 (11:41 +0100)
commit a92ce570c81dc0feaeb12a429b4bc65686d17967 upstream.

The intf_free() function frees the "intf" pointer so we cannot
dereference it again on the next line.

Fixes: 3ceed4928e75 ("ipmi: Don't allow device module unload when in use")
Signed-off-by: Dan Carpenter <error27@gmail.com>
Message-Id: <Y3M8xa1drZv4CToE@kili>
Cc: <stable@vger.kernel.org> # 5.5+
Signed-off-by: Corey Minyard <cminyard@mvista.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/char/ipmi/ipmi_msghandler.c

index 55f38058c0b468461326487f21b9e1049dcca0c1..0833a2ac2f69a9c6f7373c1a71f054b3238ce523 100644 (file)
@@ -1298,6 +1298,7 @@ static void _ipmi_destroy_user(struct ipmi_user *user)
        unsigned long    flags;
        struct cmd_rcvr  *rcvr;
        struct cmd_rcvr  *rcvrs = NULL;
+       struct module    *owner;
 
        if (!acquire_ipmi_user(user, &i)) {
                /*
@@ -1358,8 +1359,9 @@ static void _ipmi_destroy_user(struct ipmi_user *user)
                kfree(rcvr);
        }
 
+       owner = intf->owner;
        kref_put(&intf->refcount, intf_free);
-       module_put(intf->owner);
+       module_put(owner);
 }
 
 int ipmi_destroy_user(struct ipmi_user *user)