Bluetooth: L2CAP: Fix attempting to access uninitialized memory
authorLuiz Augusto von Dentz <luiz.von.dentz@intel.com>
Mon, 31 Oct 2022 23:10:52 +0000 (16:10 -0700)
committerSalvatore Bonaccorso <carnil@debian.org>
Sat, 5 Nov 2022 13:41:22 +0000 (13:41 +0000)
Origin: https://git.kernel.org/linus/b1a2cd50c0357f243b7435a732b4e62ba3157a2e
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2022-42895

On l2cap_parse_conf_req the variable efs is only initialized if
remote_efs has been set.

CVE: CVE-2022-42895
CC: stable@vger.kernel.org
Reported-by: Tamás Koczka <poprdi@google.com>
Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Reviewed-by: Tedd Ho-Jeong An <tedd.an@intel.com>
Gbp-Pq: Topic bugfix/all
Gbp-Pq: Name Bluetooth-L2CAP-Fix-attempting-to-access-uninitializ.patch

net/bluetooth/l2cap_core.c

index fbf68dd6da91a431e59592bde170d271f359832f..b8f2dcc2bd5565384e1d40aa4e93034e5a8695db 100644 (file)
@@ -3764,7 +3764,8 @@ done:
                        l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
                                           sizeof(rfc), (unsigned long) &rfc, endptr - ptr);
 
-                       if (test_bit(FLAG_EFS_ENABLE, &chan->flags)) {
+                       if (remote_efs &&
+                           test_bit(FLAG_EFS_ENABLE, &chan->flags)) {
                                chan->remote_id = efs.id;
                                chan->remote_stype = efs.stype;
                                chan->remote_msdu = le16_to_cpu(efs.msdu);