Centos-kernel-stream-9/net/bluetooth
Patrick Talbert 5d5561da82 Merge: CVE-2024-53208: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync
MR: https://gitlab.com/redhat/centos-stream/src/kernel/centos-stream-9/-/merge_requests/6300

JIRA: https://issues.redhat.com/browse/RHEL-75848
CVE: CVE-2024-53208

```
Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync

This fixes the following crash:

==================================================================
BUG: KASAN: slab-use-after-free in set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353
Read of size 8 at addr ffff888029b4dd18 by task kworker/u9:0/54

CPU: 1 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-01155-gf723224742fc #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Workqueue: hci0 hci_cmd_sync_work
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:93 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
q kasan_report+0x143/0x180 mm/kasan/report.c:601
 set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353
 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:328
 process_one_work kernel/workqueue.c:3231 [inline]
 process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
 worker_thread+0x86d/0xd10 kernel/workqueue.c:3389
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>

Allocated by task 5247:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:370 [inline]
 __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387
 kasan_kmalloc include/linux/kasan.h:211 [inline]
 __kmalloc_cache_noprof+0x19c/0x2c0 mm/slub.c:4193
 kmalloc_noprof include/linux/slab.h:681 [inline]
 kzalloc_noprof include/linux/slab.h:807 [inline]
 mgmt_pending_new+0x65/0x250 net/bluetooth/mgmt_util.c:269
 mgmt_pending_add+0x36/0x120 net/bluetooth/mgmt_util.c:296
 set_powered+0x3cd/0x5e0 net/bluetooth/mgmt.c:1394
 hci_mgmt_cmd+0xc47/0x11d0 net/bluetooth/hci_sock.c:1712
 hci_sock_sendmsg+0x7b8/0x11c0 net/bluetooth/hci_sock.c:1832
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x221/0x270 net/socket.c:745
 sock_write_iter+0x2dd/0x400 net/socket.c:1160
 new_sync_write fs/read_write.c:497 [inline]
 vfs_write+0xa72/0xc90 fs/read_write.c:590
 ksys_write+0x1a0/0x2c0 fs/read_write.c:643
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 5246:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579
 poison_slab_object+0xe0/0x150 mm/kasan/common.c:240
 __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256
 kasan_slab_free include/linux/kasan.h:184 [inline]
 slab_free_hook mm/slub.c:2256 [inline]
 slab_free mm/slub.c:4477 [inline]
 kfree+0x149/0x360 mm/slub.c:4598
 settings_rsp+0x2bc/0x390 net/bluetooth/mgmt.c:1443
 mgmt_pending_foreach+0xd1/0x130 net/bluetooth/mgmt_util.c:259
 __mgmt_power_off+0x112/0x420 net/bluetooth/mgmt.c:9455
 hci_dev_close_sync+0x665/0x11a0 net/bluetooth/hci_sync.c:5191
 hci_dev_do_close net/bluetooth/hci_core.c:483 [inline]
 hci_dev_close+0x112/0x210 net/bluetooth/hci_core.c:508
 sock_do_ioctl+0x158/0x460 net/socket.c:1222
 sock_ioctl+0x629/0x8e0 net/socket.c:1341
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83gv
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Reported-by: syzbot+03d6270b6425df1605bf@syzkaller.appspotmail.com
Tested-by: syzbot+03d6270b6425df1605bf@syzkaller.appspotmail.com
Closes: https://syzkaller.appspot.com/bug?extid=03d6270b6425df1605bf
Fixes: 275f3f648702 ("Bluetooth: Fix not checking MGMT cmd pending queue")
Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
(cherry picked from commit 0b882940665ca2849386ee459d4331aa2f8c4e7d)
```

Signed-off-by: CKI Backport Bot <cki-ci-bot+cki-gitlab-backport-bot@redhat.com>

---

<small>Created 2025-01-30 09:04 UTC by backporter - [KWF FAQ](https://red.ht/kernel_workflow_doc) - [Slack #team-kernel-workflow](https://redhat-internal.slack.com/archives/C04LRUPMJQ5) - [Source](https://gitlab.com/cki-project/kernel-workflow/-/blob/main/webhook/utils/backporter.py) - [Documentation](https://gitlab.com/cki-project/kernel-workflow/-/blob/main/docs/README.backporter.md) - [Report an issue](https://gitlab.com/cki-project/kernel-workflow/-/issues/new?issue%5Btitle%5D=backporter%20webhook%20issue)</small>

Approved-by: Bastien Nocera <bnocera@redhat.com>
Approved-by: David Marlin <dmarlin@redhat.com>
Approved-by: CKI KWF Bot <cki-ci-bot+kwf-gitlab-com@redhat.com>

Merged-by: Patrick Talbert <ptalbert@redhat.com>
2025-02-07 09:54:24 -05:00
..
bnep Bluetooth: bnep: Fix out-of-bound access 2024-12-11 15:24:59 +01:00
cmtp Bluetooth: CMTP: Mark BT_CMTP as DEPRECATED 2024-12-11 15:25:22 +01:00
hidp Bluetooth: Init sk_peer_* on bt_sock_alloc 2024-05-22 21:35:04 -05:00
rfcomm Merge: CVE-2024-57894: Bluetooth: hci_core: Fix sleeping function called from invalid context 2025-01-28 16:03:15 +01:00
6lowpan.c Bluetooth: constify the struct device_type usage 2024-12-11 15:24:58 +01:00
Kconfig Bluetooth: Remove BT_HS 2024-08-19 13:48:19 +02:00
Makefile Bluetooth: Remove hci_request.{c,h} 2024-12-11 15:25:14 +01:00
af_bluetooth.c Bluetooth: Remove debugfs directory on module init failure 2024-12-11 15:25:23 +01:00
aosp.c Bluetooth: Fix null pointer deref on unexpected status event 2022-10-18 10:32:40 +05:30
aosp.h Bluetooth: aosp: Support AOSP Bluetooth Quality Report 2022-04-27 11:49:01 +05:30
coredump.c Bluetooth: Remove unnecessary NULL check before vfree() 2024-05-22 21:35:06 -05:00
ecdh_helper.c Bluetooth: Use crypto_wait_req 2023-10-23 09:05:29 +02:00
ecdh_helper.h
eir.c Bluetooth: Fix eir name length 2024-12-11 15:25:00 +01:00
eir.h Bluetooth: Add initial implementation of BIS connections 2022-10-18 10:32:38 +05:30
hci_codec.c Bluetooth: Fix support for Read Local Supported Codecs V2 2023-10-23 09:05:21 +02:00
hci_codec.h
hci_conn.c Bluetooth: hci_conn: Use disable_delayed_work_sync 2025-01-06 09:56:31 +00:00
hci_core.c Merge: CVE-2024-57894: Bluetooth: hci_core: Fix sleeping function called from invalid context 2025-01-28 16:03:15 +01:00
hci_debugfs.c Bluetooth: Remove hci_request.{c,h} 2024-12-11 15:25:14 +01:00
hci_debugfs.h
hci_event.c Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating 2025-01-06 09:44:24 +00:00
hci_sock.c Merge: CVE-2024-36013: Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect() 2024-09-11 07:11:59 +00:00
hci_sync.c Bluetooth: hci_core: Disable works on hci_unregister_dev 2024-12-11 15:25:24 +01:00
hci_sysfs.c Bluetooth: fix use-after-free in device_for_each_child() 2025-01-30 09:02:51 +00:00
iso.c Merge: CVE-2024-57879: Bluetooth: iso: Always release hdev at the end of iso_listen_bis 2025-02-07 09:54:23 -05:00
l2cap_core.c Bluetooth: hci_core: Fix sleeping function called from invalid context 2025-01-15 15:36:09 +00:00
l2cap_sock.c Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc 2025-01-21 09:10:37 +00:00
leds.c Bluetooth: Use led_set_brightness() in LED trigger activate() callback 2024-12-11 15:25:21 +01:00
leds.h
lib.c Bluetooth: Add documentation to exported functions in lib 2024-05-22 21:35:09 -05:00
mgmt.c Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync 2025-01-30 09:04:18 +00:00
mgmt_config.c
mgmt_config.h
mgmt_util.c Bluetooth: Implement support for Mesh 2023-10-23 09:05:17 +02:00
mgmt_util.h Bluetooth: Fix a buffer overflow in mgmt_mesh_add() 2023-10-23 09:05:28 +02:00
msft.c Bluetooth: Remove hci_request.{c,h} 2024-12-11 15:25:14 +01:00
msft.h Bluetooth: msft: fix slab-use-after-free in msft_do_close() 2024-08-09 20:01:23 +00:00
sco.c Bluetooth: hci_core: Fix sleeping function called from invalid context 2025-01-15 15:36:09 +00:00
selftest.c
selftest.h
smp.c Revert "Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE" 2024-12-11 15:25:19 +01:00
smp.h