diff mbox series

[SRU,Kinetic,1/2] Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM

Message ID 20221202181017.405052-2-cengiz.can@canonical.com
State New
Headers show
Series [SRU,Kinetic,1/2] Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM | expand

Commit Message

Cengiz Can Dec. 2, 2022, 6:10 p.m. UTC
From: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>

The Bluetooth spec states that the valid range for SPSM is from
0x0001-0x00ff so it is invalid to accept values outside of this range:

  BLUETOOTH CORE SPECIFICATION Version 5.3 | Vol 3, Part A
  page 1059:
  Table 4.15: L2CAP_LE_CREDIT_BASED_CONNECTION_REQ SPSM ranges

CVE: CVE-2022-42896
CC: stable@vger.kernel.org
Reported-by: Tamás Koczka <poprdi@google.com>
Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Reviewed-by: Tedd Ho-Jeong An <tedd.an@intel.com>
(cherry picked from commit 711f8c3fb3db61897080468586b970c87c61d9e4)
Signed-off-by: Cengiz Can <cengiz.can@canonical.com>
---
 net/bluetooth/l2cap_core.c | 25 +++++++++++++++++++++++++
 1 file changed, 25 insertions(+)

Comments

Thadeu Lima de Souza Cascardo Dec. 5, 2022, 1:55 p.m. UTC | #1
On Fri, Dec 02, 2022 at 09:10:16PM +0300, Cengiz Can wrote:
> From: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
> 
> The Bluetooth spec states that the valid range for SPSM is from
> 0x0001-0x00ff so it is invalid to accept values outside of this range:
> 
>   BLUETOOTH CORE SPECIFICATION Version 5.3 | Vol 3, Part A
>   page 1059:
>   Table 4.15: L2CAP_LE_CREDIT_BASED_CONNECTION_REQ SPSM ranges
> 
> CVE: CVE-2022-42896
> CC: stable@vger.kernel.org
> Reported-by: Tamás Koczka <poprdi@google.com>
> Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
> Reviewed-by: Tedd Ho-Jeong An <tedd.an@intel.com>
> (cherry picked from commit 711f8c3fb3db61897080468586b970c87c61d9e4)

You still need the CVE line here. I don't think our changelog machinery
understands the line above.

Cascardo.

> Signed-off-by: Cengiz Can <cengiz.can@canonical.com>
> ---
>  net/bluetooth/l2cap_core.c | 25 +++++++++++++++++++++++++
>  1 file changed, 25 insertions(+)
> 
> diff --git a/net/bluetooth/l2cap_core.c b/net/bluetooth/l2cap_core.c
> index 0fc30664249b..375ab8fa3bcf 100644
> --- a/net/bluetooth/l2cap_core.c
> +++ b/net/bluetooth/l2cap_core.c
> @@ -5812,6 +5812,19 @@ static int l2cap_le_connect_req(struct l2cap_conn *conn,
>  	BT_DBG("psm 0x%2.2x scid 0x%4.4x mtu %u mps %u", __le16_to_cpu(psm),
>  	       scid, mtu, mps);
>  
> +	/* BLUETOOTH CORE SPECIFICATION Version 5.3 | Vol 3, Part A
> +	 * page 1059:
> +	 *
> +	 * Valid range: 0x0001-0x00ff
> +	 *
> +	 * Table 4.15: L2CAP_LE_CREDIT_BASED_CONNECTION_REQ SPSM ranges
> +	 */
> +	if (!psm || __le16_to_cpu(psm) > L2CAP_PSM_LE_DYN_END) {
> +		result = L2CAP_CR_LE_BAD_PSM;
> +		chan = NULL;
> +		goto response;
> +	}
> +
>  	/* Check if we have socket listening on psm */
>  	pchan = l2cap_global_chan_by_psm(BT_LISTEN, psm, &conn->hcon->src,
>  					 &conn->hcon->dst, LE_LINK);
> @@ -6000,6 +6013,18 @@ static inline int l2cap_ecred_conn_req(struct l2cap_conn *conn,
>  
>  	psm  = req->psm;
>  
> +	/* BLUETOOTH CORE SPECIFICATION Version 5.3 | Vol 3, Part A
> +	 * page 1059:
> +	 *
> +	 * Valid range: 0x0001-0x00ff
> +	 *
> +	 * Table 4.15: L2CAP_LE_CREDIT_BASED_CONNECTION_REQ SPSM ranges
> +	 */
> +	if (!psm || __le16_to_cpu(psm) > L2CAP_PSM_LE_DYN_END) {
> +		result = L2CAP_CR_LE_BAD_PSM;
> +		goto response;
> +	}
> +
>  	BT_DBG("psm 0x%2.2x mtu %u mps %u", __le16_to_cpu(psm), mtu, mps);
>  
>  	memset(&pdu, 0, sizeof(pdu));
> -- 
> 2.37.2
> 
> 
> -- 
> kernel-team mailing list
> kernel-team@lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
Cengiz Can Dec. 5, 2022, 1:57 p.m. UTC | #2
On 05/12/2022 16:55, Thadeu Lima de Souza Cascardo wrote:
>> CVE: CVE-2022-42896
>> CC: stable@vger.kernel.org
>> Reported-by: Tamás Koczka <poprdi@google.com>
>> Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
>> Reviewed-by: Tedd Ho-Jeong An <tedd.an@intel.com>
>> (cherry picked from commit 711f8c3fb3db61897080468586b970c87c61d9e4)
> 
> You still need the CVE line here. I don't think our changelog machinery
> understands the line above.

I wasn't sure about that. Thank you.

> 
> Cascardo.
>
diff mbox series

Patch

diff --git a/net/bluetooth/l2cap_core.c b/net/bluetooth/l2cap_core.c
index 0fc30664249b..375ab8fa3bcf 100644
--- a/net/bluetooth/l2cap_core.c
+++ b/net/bluetooth/l2cap_core.c
@@ -5812,6 +5812,19 @@  static int l2cap_le_connect_req(struct l2cap_conn *conn,
 	BT_DBG("psm 0x%2.2x scid 0x%4.4x mtu %u mps %u", __le16_to_cpu(psm),
 	       scid, mtu, mps);
 
+	/* BLUETOOTH CORE SPECIFICATION Version 5.3 | Vol 3, Part A
+	 * page 1059:
+	 *
+	 * Valid range: 0x0001-0x00ff
+	 *
+	 * Table 4.15: L2CAP_LE_CREDIT_BASED_CONNECTION_REQ SPSM ranges
+	 */
+	if (!psm || __le16_to_cpu(psm) > L2CAP_PSM_LE_DYN_END) {
+		result = L2CAP_CR_LE_BAD_PSM;
+		chan = NULL;
+		goto response;
+	}
+
 	/* Check if we have socket listening on psm */
 	pchan = l2cap_global_chan_by_psm(BT_LISTEN, psm, &conn->hcon->src,
 					 &conn->hcon->dst, LE_LINK);
@@ -6000,6 +6013,18 @@  static inline int l2cap_ecred_conn_req(struct l2cap_conn *conn,
 
 	psm  = req->psm;
 
+	/* BLUETOOTH CORE SPECIFICATION Version 5.3 | Vol 3, Part A
+	 * page 1059:
+	 *
+	 * Valid range: 0x0001-0x00ff
+	 *
+	 * Table 4.15: L2CAP_LE_CREDIT_BASED_CONNECTION_REQ SPSM ranges
+	 */
+	if (!psm || __le16_to_cpu(psm) > L2CAP_PSM_LE_DYN_END) {
+		result = L2CAP_CR_LE_BAD_PSM;
+		goto response;
+	}
+
 	BT_DBG("psm 0x%2.2x mtu %u mps %u", __le16_to_cpu(psm), mtu, mps);
 
 	memset(&pdu, 0, sizeof(pdu));