BACKPORT: binder: fix possible UAF when freeing buffer
There is a race between the binder driver cleaning up a completed transaction via binder_free_transaction() and a user calling binder_ioctl(BC_FREE_BUFFER) to release a buffer. It doesn't matter which is first but they need to be protected against running concurrently which can result in a UAF. Bug: 133758011 (cherry pick from a370003c) [ Resolved conflict in drivers/android/binder.c ] Change-Id: Ie1426ff3d00218d050d61ff77b333ddf8818b7c9 Signed-off-by:Todd Kjos <tkjos@google.com>
Loading
Please sign in to comment