Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM
authorLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
Mon, 31 Oct 2022 23:10:32 +0000 (16:10 -0700)
committerSalvatore Bonaccorso <carnil@debian.org>
Sat, 5 Nov 2022 13:41:22 +0000 (13:41 +0000)
commit22b61d553ac104be09c6e6825b7167fac000edf6
treed38fb625861dddba31ab5054336723f85b39d23c
parentc7d9bbd121c961d69d8b2e07cdc0c56fb3f81786
Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM

Origin: https://git.kernel.org/linus/711f8c3fb3db61897080468586b970c87c61d9e4
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2022-42896

The Bluetooth spec states that the valid range for SPSM is from
0x0001-0x00ff so it is invalid to accept values outside of this range:

  BLUETOOTH CORE SPECIFICATION Version 5.3 | Vol 3, Part A
  page 1059:
  Table 4.15: L2CAP_LE_CREDIT_BASED_CONNECTION_REQ SPSM ranges

CVE: CVE-2022-42896
CC: stable@vger.kernel.org
Reported-by: Tamás Koczka <poprdi@google.com>
Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Reviewed-by: Tedd Ho-Jeong An <tedd.an@intel.com>
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name Bluetooth-L2CAP-Fix-accepting-connection-request-for.patch
net/bluetooth/l2cap_core.c