linux-brain/drivers/isdn/hardware/mISDN
Zou Wei 3ecd228c63 mISDN: fix possible use-after-free in HFC_cleanup()
[ Upstream commit 009fc857c5f6fda81f2f7dd851b2d54193a8e733 ]

This module's remove path calls del_timer(). However, that function
does not wait until the timer handler finishes. This means that the
timer handler may still be running after the driver's remove function
has finished, which would result in a use-after-free.

Fix by calling del_timer_sync(), which makes sure the timer handler
has finished, and unable to re-schedule itself.

Reported-by: Hulk Robot <hulkci@huawei.com>
Signed-off-by: Zou Wei <zou_wei@huawei.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2021-07-19 08:53:08 +02:00
..
Kconfig
Makefile
avmfritz.c
hfc_multi.h
hfc_multi_8xx.h
hfc_pci.h
hfcmulti.c
hfcpci.c mISDN: fix possible use-after-free in HFC_cleanup() 2021-07-19 08:53:08 +02:00
hfcsusb.c isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info 2021-06-03 08:59:09 +02:00
hfcsusb.h
iohelper.h
ipac.h
isar.h
isdnhdlc.c
isdnhdlc.h
mISDNinfineon.c isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io 2021-06-03 08:59:09 +02:00
mISDNipac.c mISDN: fix crash in fritzpci 2021-04-10 13:34:30 +02:00
mISDNisar.c
netjet.c isdn: mISDN: netjet: Fix crash in nj_probe: 2021-06-16 11:59:34 +02:00
netjet.h
speedfax.c
w6692.c
w6692.h