Skip to content

Commit 4d7b41c

Browse files
swkim101Vudentz
authored andcommitted
Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()
Extend a critical section to prevent chan from early freeing. Also make the l2cap_connect() return type void. Nothing is using the returned value but it is ugly to return a potentially freed pointer. Making it void will help with backports because earlier kernels did use the return value. Now the compile will break for kernels where this patch is not a complete fix. Call stack summary: [use] l2cap_bredr_sig_cmd l2cap_connect ┌ mutex_lock(&conn->chan_lock); │ chan = pchan->ops->new_connection(pchan); <- alloc chan │ __l2cap_chan_add(conn, chan); │ l2cap_chan_hold(chan); │ list_add(&chan->list, &conn->chan_l); ... (1) └ mutex_unlock(&conn->chan_lock); chan->conf_state ... (4) <- use after free [free] l2cap_conn_del ┌ mutex_lock(&conn->chan_lock); │ foreach chan in conn->chan_l: ... (2) │ l2cap_chan_put(chan); │ l2cap_chan_destroy │ kfree(chan) ... (3) <- chan freed └ mutex_unlock(&conn->chan_lock); ================================================================== BUG: KASAN: slab-use-after-free in instrument_atomic_read include/linux/instrumented.h:68 [inline] BUG: KASAN: slab-use-after-free in _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline] BUG: KASAN: slab-use-after-free in l2cap_connect+0xa67/0x11a0 net/bluetooth/l2cap_core.c:4260 Read of size 8 at addr ffff88810bf040a0 by task kworker/u3:1/311 Fixes: 73ffa90 ("Bluetooth: Move conf_{req,rsp} stuff to struct l2cap_chan") Signed-off-by: Sungwoo Kim <[email protected]> Signed-off-by: Luiz Augusto von Dentz <[email protected]>
1 parent 66c3933 commit 4d7b41c

File tree

1 file changed

+10
-11
lines changed

1 file changed

+10
-11
lines changed

net/bluetooth/l2cap_core.c

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3902,13 +3902,12 @@ static inline int l2cap_command_rej(struct l2cap_conn *conn,
39023902
return 0;
39033903
}
39043904

3905-
static struct l2cap_chan *l2cap_connect(struct l2cap_conn *conn,
3906-
struct l2cap_cmd_hdr *cmd,
3907-
u8 *data, u8 rsp_code, u8 amp_id)
3905+
static void l2cap_connect(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd,
3906+
u8 *data, u8 rsp_code, u8 amp_id)
39083907
{
39093908
struct l2cap_conn_req *req = (struct l2cap_conn_req *) data;
39103909
struct l2cap_conn_rsp rsp;
3911-
struct l2cap_chan *chan = NULL, *pchan;
3910+
struct l2cap_chan *chan = NULL, *pchan = NULL;
39123911
int result, status = L2CAP_CS_NO_INFO;
39133912

39143913
u16 dcid = 0, scid = __le16_to_cpu(req->scid);
@@ -3921,7 +3920,7 @@ static struct l2cap_chan *l2cap_connect(struct l2cap_conn *conn,
39213920
&conn->hcon->dst, ACL_LINK);
39223921
if (!pchan) {
39233922
result = L2CAP_CR_BAD_PSM;
3924-
goto sendresp;
3923+
goto response;
39253924
}
39263925

39273926
mutex_lock(&conn->chan_lock);
@@ -4008,17 +4007,15 @@ static struct l2cap_chan *l2cap_connect(struct l2cap_conn *conn,
40084007
}
40094008

40104009
response:
4011-
l2cap_chan_unlock(pchan);
4012-
mutex_unlock(&conn->chan_lock);
4013-
l2cap_chan_put(pchan);
4014-
4015-
sendresp:
40164010
rsp.scid = cpu_to_le16(scid);
40174011
rsp.dcid = cpu_to_le16(dcid);
40184012
rsp.result = cpu_to_le16(result);
40194013
rsp.status = cpu_to_le16(status);
40204014
l2cap_send_cmd(conn, cmd->ident, rsp_code, sizeof(rsp), &rsp);
40214015

4016+
if (!pchan)
4017+
return;
4018+
40224019
if (result == L2CAP_CR_PEND && status == L2CAP_CS_NO_INFO) {
40234020
struct l2cap_info_req info;
40244021
info.type = cpu_to_le16(L2CAP_IT_FEAT_MASK);
@@ -4041,7 +4038,9 @@ static struct l2cap_chan *l2cap_connect(struct l2cap_conn *conn,
40414038
chan->num_conf_req++;
40424039
}
40434040

4044-
return chan;
4041+
l2cap_chan_unlock(pchan);
4042+
mutex_unlock(&conn->chan_lock);
4043+
l2cap_chan_put(pchan);
40454044
}
40464045

40474046
static int l2cap_connect_req(struct l2cap_conn *conn,

0 commit comments

Comments
 (0)