diff options
author | Luiz Augusto von Dentz <luiz.von.dentz@intel.com> | 2022-10-31 16:10:52 -0700 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2022-11-10 18:15:36 +0100 |
commit | 3e4697ffdfbb38a2755012c4e571546c89ab6422 (patch) | |
tree | ccbb5a6fbb571037ac5fff1881ee6c0ff15949ab | |
parent | 81035e1201e26d57d9733ac59140a3e29befbc5a (diff) | |
download | linux-stable-3e4697ffdfbb38a2755012c4e571546c89ab6422.tar.gz linux-stable-3e4697ffdfbb38a2755012c4e571546c89ab6422.tar.bz2 linux-stable-3e4697ffdfbb38a2755012c4e571546c89ab6422.zip |
Bluetooth: L2CAP: Fix attempting to access uninitialized memory
commit b1a2cd50c0357f243b7435a732b4e62ba3157a2e upstream.
On l2cap_parse_conf_req the variable efs is only initialized if
remote_efs has been set.
CVE: CVE-2022-42895
CC: stable@vger.kernel.org
Reported-by: Tamás Koczka <poprdi@google.com>
Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Reviewed-by: Tedd Ho-Jeong An <tedd.an@intel.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r-- | net/bluetooth/l2cap_core.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/net/bluetooth/l2cap_core.c b/net/bluetooth/l2cap_core.c index a66c272a11f6..16f954a4802c 100644 --- a/net/bluetooth/l2cap_core.c +++ b/net/bluetooth/l2cap_core.c @@ -3764,7 +3764,8 @@ done: l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC, sizeof(rfc), (unsigned long) &rfc, endptr - ptr); - if (test_bit(FLAG_EFS_ENABLE, &chan->flags)) { + if (remote_efs && + test_bit(FLAG_EFS_ENABLE, &chan->flags)) { chan->remote_id = efs.id; chan->remote_stype = efs.stype; chan->remote_msdu = le16_to_cpu(efs.msdu); |