Skip to content

Commit 5dc7d23

Browse files
committed
Bluetooth: hci_conn: Fix possible UAF
This fixes the following trace: ================================================================== BUG: KASAN: slab-use-after-free in hci_conn_del+0xba/0x3a0 Write of size 8 at addr ffff88800208e9c8 by task iso-tester/31 CPU: 0 PID: 31 Comm: iso-tester Not tainted 6.3.0-rc2-g991aa4a69a47 #4716 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.1-2.fc36 04/01/2014 Call Trace: <TASK> dump_stack_lvl+0x1d/0x70 print_report+0xce/0x610 ? __virt_addr_valid+0xd4/0x150 ? hci_conn_del+0xba/0x3a0 kasan_report+0xdd/0x110 ? hci_conn_del+0xba/0x3a0 hci_conn_del+0xba/0x3a0 hci_conn_hash_flush+0xf2/0x120 hci_dev_close_sync+0x388/0x920 hci_unregister_dev+0x122/0x260 vhci_release+0x4f/0x90 __fput+0x102/0x430 task_work_run+0xf1/0x160 ? __pfx_task_work_run+0x10/0x10 ? mark_held_locks+0x24/0x90 exit_to_user_mode_prepare+0x170/0x180 syscall_exit_to_user_mode+0x19/0x50 do_syscall_64+0x4e/0x90 entry_SYSCALL_64_after_hwframe+0x70/0xda Fixes: 0f00cd3 ("Bluetooth: Free potentially unfreed SCO connection") Link: https://syzkaller.appspot.com/bug?extid=8bb72f86fc823817bc5d Cc: <[email protected]> Signed-off-by: Luiz Augusto von Dentz <[email protected]>
1 parent 975abc0 commit 5dc7d23

File tree

1 file changed

+24
-6
lines changed

1 file changed

+24
-6
lines changed

net/bluetooth/hci_conn.c

Lines changed: 24 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1068,6 +1068,17 @@ struct hci_conn *hci_conn_add(struct hci_dev *hdev, int type, bdaddr_t *dst,
10681068
return conn;
10691069
}
10701070

1071+
static bool hci_conn_unlink(struct hci_conn *conn)
1072+
{
1073+
if (!conn->link)
1074+
return false;
1075+
1076+
conn->link->link = NULL;
1077+
conn->link = NULL;
1078+
1079+
return true;
1080+
}
1081+
10711082
int hci_conn_del(struct hci_conn *conn)
10721083
{
10731084
struct hci_dev *hdev = conn->hdev;
@@ -1079,15 +1090,16 @@ int hci_conn_del(struct hci_conn *conn)
10791090
cancel_delayed_work_sync(&conn->idle_work);
10801091

10811092
if (conn->type == ACL_LINK) {
1082-
struct hci_conn *sco = conn->link;
1083-
if (sco) {
1084-
sco->link = NULL;
1093+
struct hci_conn *link = conn->link;
1094+
1095+
if (link) {
1096+
hci_conn_unlink(conn);
10851097
/* Due to race, SCO connection might be not established
10861098
* yet at this point. Delete it now, otherwise it is
10871099
* possible for it to be stuck and can't be deleted.
10881100
*/
1089-
if (sco->handle == HCI_CONN_HANDLE_UNSET)
1090-
hci_conn_del(sco);
1101+
if (link->handle == HCI_CONN_HANDLE_UNSET)
1102+
hci_conn_del(link);
10911103
}
10921104

10931105
/* Unacked frames */
@@ -1103,7 +1115,7 @@ int hci_conn_del(struct hci_conn *conn)
11031115
struct hci_conn *acl = conn->link;
11041116

11051117
if (acl) {
1106-
acl->link = NULL;
1118+
hci_conn_unlink(conn);
11071119
hci_conn_drop(acl);
11081120
}
11091121

@@ -2434,6 +2446,12 @@ void hci_conn_hash_flush(struct hci_dev *hdev)
24342446
c->state = BT_CLOSED;
24352447

24362448
hci_disconn_cfm(c, HCI_ERROR_LOCAL_HOST_TERM);
2449+
2450+
/* Unlink before deleting otherwise it is possible that
2451+
* hci_conn_del removes the link which may cause the list to
2452+
* contain items already freed.
2453+
*/
2454+
hci_conn_unlink(c);
24372455
hci_conn_del(c);
24382456
}
24392457
}

0 commit comments

Comments
 (0)