Description
In the Linux kernel, the following vulnerability has been resolved: can: raw: fix ro->uniq use-after-free in raw_rcv() raw_release() unregisters raw CAN receive filters via can_rx_unregister(), but receiver deletion is deferred with call_rcu(). This leaves a window where raw_rcv() may still be running in an RCU read-side critical section after raw_release() frees ro->uniq, leading to a use-after-free of the percpu uniq storage. Move free_percpu(ro->uniq) out of raw_release() and into a raw-specific socket destructor. can_rx_unregister() takes an extra reference to the socket and only drops it from the RCU callback, so freeing uniq from sk_destruct ensures the percpu area is not released until the relevant callbacks have drained. [mkl: applied manually]
Product status
514ac99c64b22d83b52dfee3b8becaa69a92bc4a (git) before 5e9cfffad898bbeaafd0ea608a6d267362f050fc
514ac99c64b22d83b52dfee3b8becaa69a92bc4a (git) before 572f0bf536ebc14f6e7da3d21a85cf076de8358e
514ac99c64b22d83b52dfee3b8becaa69a92bc4a (git) before 1a0f2de81f7fbdc538fc72d7d74609b79bc83cc0
514ac99c64b22d83b52dfee3b8becaa69a92bc4a (git) before 7201a531b9a5ed892bfda5ded9194ef622de8ffa
514ac99c64b22d83b52dfee3b8becaa69a92bc4a (git) before 34c1741254ff972e8375faf176678a248826fe3a
514ac99c64b22d83b52dfee3b8becaa69a92bc4a (git) before a535a9217ca3f2fccedaafb2fddb4c48f27d36dc
4.1
Any version before 4.1
6.6.136 (semver)
6.12.83 (semver)
6.18.24 (semver)
6.19.14 (semver)
7.0.1 (semver)
7.1-rc1 (original_commit_for_fix)
References
git.kernel.org/...c/5e9cfffad898bbeaafd0ea608a6d267362f050fc
git.kernel.org/...c/572f0bf536ebc14f6e7da3d21a85cf076de8358e
git.kernel.org/...c/1a0f2de81f7fbdc538fc72d7d74609b79bc83cc0
git.kernel.org/...c/7201a531b9a5ed892bfda5ded9194ef622de8ffa
git.kernel.org/...c/34c1741254ff972e8375faf176678a248826fe3a
git.kernel.org/...c/a535a9217ca3f2fccedaafb2fddb4c48f27d36dc