diff options
| author | Ignat Korchagin <[email protected]> | 2024-10-14 15:38:01 +0000 |
|---|---|---|
| committer | Jakub Kicinski <[email protected]> | 2024-10-16 01:43:07 +0000 |
| commit | 7c4f78cdb8e7501e9f92d291a7d956591bf73be9 (patch) | |
| tree | c6aac9f8e09f7b0445a1cbaa0704397da0bf217e /net/bluetooth/l2cap_sock.c | |
| parent | af_packet: avoid erroring out after sock_init_data() in packet_create() (diff) | |
| download | kernel-7c4f78cdb8e7501e9f92d291a7d956591bf73be9.tar.gz kernel-7c4f78cdb8e7501e9f92d291a7d956591bf73be9.zip | |
Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
bt_sock_alloc() allocates the sk object and attaches it to the provided
sock object. On error l2cap_sock_alloc() frees the sk object, but the
dangling pointer is still attached to the sock object, which may create
use-after-free in other code.
Signed-off-by: Ignat Korchagin <[email protected]>
Reviewed-by: Kuniyuki Iwashima <[email protected]>
Reviewed-by: Eric Dumazet <[email protected]>
Link: https://patch.msgid.link/[email protected]
Signed-off-by: Jakub Kicinski <[email protected]>
Diffstat (limited to 'net/bluetooth/l2cap_sock.c')
| -rw-r--r-- | net/bluetooth/l2cap_sock.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/net/bluetooth/l2cap_sock.c b/net/bluetooth/l2cap_sock.c index ba437c6f6ee5..18e89e764f3b 100644 --- a/net/bluetooth/l2cap_sock.c +++ b/net/bluetooth/l2cap_sock.c @@ -1886,6 +1886,7 @@ static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock, chan = l2cap_chan_create(); if (!chan) { sk_free(sk); + sock->sk = NULL; return NULL; } |
