Bluetooth: ISO: Fix memory corruption
The following memory corruption can happen since iso_pinfo.base size
did not account for its headers (4 bytes):
net/bluetooth/eir.c
76 memcpy(&eir[eir_len], data, data_len);
^^^^^^^ ^^^^^^^^
77 eir_len += data_len;
78
79 return eir_len;
80 }
The "eir" buffer has 252 bytes and data_len is 252 but we do a memcpy()
to &eir[4] so this can corrupt 4 bytes beyond the end of the buffer.
Fixes: f764a6c2c1
("Bluetooth: ISO: Add broadcast support")
Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
This commit is contained in:
parent
ce78e557ff
commit
b444342327
@ -44,6 +44,9 @@ static void iso_sock_kill(struct sock *sk);
|
||||
/* ----- ISO socket info ----- */
|
||||
#define iso_pi(sk) ((struct iso_pinfo *)sk)
|
||||
|
||||
#define EIR_SERVICE_DATA_LENGTH 4
|
||||
#define BASE_MAX_LENGTH (HCI_MAX_PER_AD_LENGTH - EIR_SERVICE_DATA_LENGTH)
|
||||
|
||||
struct iso_pinfo {
|
||||
struct bt_sock bt;
|
||||
bdaddr_t src;
|
||||
@ -57,7 +60,7 @@ struct iso_pinfo {
|
||||
__u32 flags;
|
||||
struct bt_iso_qos qos;
|
||||
__u8 base_len;
|
||||
__u8 base[HCI_MAX_PER_AD_LENGTH];
|
||||
__u8 base[BASE_MAX_LENGTH];
|
||||
struct iso_conn *conn;
|
||||
};
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user