Centos-kernel-stream-9/include/net/bluetooth
Rado Vrbovsky d9eea2914f Merge: CVE-2024-36013: Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()
MR: https://gitlab.com/redhat/centos-stream/src/kernel/centos-stream-9/-/merge_requests/4996

JIRA: https://issues.redhat.com/browse/RHEL-38459  
CVE: CVE-2024-36013

```
Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()

Extend a critical section to prevent chan from early freeing.
Also make the l2cap_connect() return type void. Nothing is using the
returned value but it is ugly to return a potentially freed pointer.
Making it void will help with backports because earlier kernels did use
the return value. Now the compile will break for kernels where this
patch is not a complete fix.

Call stack summary:

[use]
l2cap_bredr_sig_cmd
  l2cap_connect
  ┌ mutex_lock(&conn->chan_lock);
  │ chan = pchan->ops->new_connection(pchan); <- alloc chan
  │ __l2cap_chan_add(conn, chan);
  │   l2cap_chan_hold(chan);
  │   list_add(&chan->list, &conn->chan_l);   ... (1)
  └ mutex_unlock(&conn->chan_lock);
    chan->conf_state              ... (4) <- use after free

[free]
l2cap_conn_del
┌ mutex_lock(&conn->chan_lock);
│ foreach chan in conn->chan_l:            ... (2)
│   l2cap_chan_put(chan);
│     l2cap_chan_destroy
│       kfree(chan)               ... (3) <- chan freed
└ mutex_unlock(&conn->chan_lock);

==================================================================
BUG: KASAN: slab-use-after-free in instrument_atomic_read
include/linux/instrumented.h:68 [inline]
BUG: KASAN: slab-use-after-free in _test_bit
include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]
BUG: KASAN: slab-use-after-free in l2cap_connect+0xa67/0x11a0
net/bluetooth/l2cap_core.c:4260
Read of size 8 at addr ffff88810bf040a0 by task kworker/u3:1/311

Fixes: 73ffa904b7 ("Bluetooth: Move conf_{req,rsp} stuff to struct l2cap_chan")
Signed-off-by: Sungwoo Kim <iam@sung-woo.kim>
Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
(cherry picked from commit 4d7b41c0e43995b0e992b9f8903109275744b658)
```

Signed-off-by: Bastien Nocera <bnocera@redhat.com>

Approved-by: Bastien Nocera <bnocera@redhat.com>
Approved-by: Marc Milgram <mmilgram@redhat.com>
Approved-by: CKI KWF Bot <cki-ci-bot+kwf-gitlab-com@redhat.com>

Merged-by: Rado Vrbovsky <rvrbovsk@redhat.com>
2024-09-11 07:11:59 +00:00
..
bluetooth.h Bluetooth: SCO: Fix not validating setsockopt user input 2024-08-12 11:54:52 +02:00
coredump.h Bluetooth: Add support for hci devcoredump 2023-11-07 11:08:57 +01:00
hci.h Bluetooth: HCI: Remove HCI_AMP support 2024-08-19 13:48:20 +02:00
hci_core.h Bluetooth: HCI: Remove HCI_AMP support 2024-08-19 13:48:20 +02:00
hci_mon.h Bluetooth: hci_sock: Correctly bounds check and pad HCI_MON_NEW_INDEX name 2024-01-11 16:47:26 +01:00
hci_sock.h Bluetooth: Fix HCIGETDEVINFO regression 2022-10-18 10:32:42 +05:30
hci_sync.h Bluetooth: ISO: Fix BIS cleanup 2024-05-22 21:35:08 -05:00
iso.h Bluetooth: ISO: Add broadcast support 2022-10-18 10:32:38 +05:30
l2cap.h Bluetooth: Remove BT_HS 2024-08-19 13:48:19 +02:00
mgmt.h Bluetooth: Check for ISO support in controller 2024-01-11 16:47:22 +01:00
rfcomm.h
sco.h Bluetooth: af_bluetooth: Make BT_PKT_STATUS generic 2024-05-22 21:35:05 -05:00