Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp3961440img; Mon, 25 Mar 2019 23:35:38 -0700 (PDT) X-Google-Smtp-Source: APXvYqzKxyUsIIMgXTXBH1epPNtoHJRcuPAY5Q0pS8eMOYBQ16IIFJJWCWkl8oOcUBU8+bGsTTLk X-Received: by 2002:a63:ca:: with SMTP id 193mr27226022pga.288.1553582138704; Mon, 25 Mar 2019 23:35:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553582138; cv=none; d=google.com; s=arc-20160816; b=nL8MolwARg6KYnVc0eKKK7tlx60jeQvkWmCL2mHtAJdzkogaQkA79Y8zqrMXz1eX1m L8ZAzN2kTiS+Yz1qPTj4HRzjFW53mV5V/GuyvcqG2Dq07JSFScfYVymSVd+jMqvhYTt5 4LOFpVNtfgzuM9eyBVPP8fSe51A2wK6qw1r9LmSzlzQd5KHXYi0wN+x7iu6dumCKvtGM tKXHE1rkTwqM+gx+Bd1kTrJkVPIWKqR/TBe3WXjZJRN0fgXuNQKfx4SxoeQ/hRKL/dug vr4Mk6Deo1T5Ur9RMKW8Y1d5WdOax1cMuwZXN5VAs7UvLK/d6xa0ukoWrIaWBM67QI46 DUxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=COZJ1Mj4X7nWshz75L+pp4G+pCGJGZMzIFIzwXDQHrk=; b=LK2si2xhDraCSvPAYi5VYh9zhnWWorOqPz+qaaQfPy+xR8Z2273+UOYwOXysxpc0kq n72HPibpWWMSRlr7ZbtLgz3aTcUXfUE6wlhD1aSzHWd9XRLMTCmAeMb1qW1vjnBvXV28 6s09N8QqNWuMhmp6AxoNuIKARBwHgm6rt3Ar7pPvi2p0t7bAU/sXJ0cX0nf0NeRtcQLO dpf2l6fCFK72gH5Qdd86Tm/ACQSMb/ZmB++1GfB2gNpT+BS33utg9iBHOzYp9noRE1QE /MAL7Mt907+kZt70EFobfnl46+Rrr7BfZHa3OpBvYTc5smlRhwixhdAWWOOK6VvbiWtg RYxA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=BHLflrHR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 127si8143816pgf.595.2019.03.25.23.35.23; Mon, 25 Mar 2019 23:35:38 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=BHLflrHR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731785AbfCZGd7 (ORCPT + 99 others); Tue, 26 Mar 2019 02:33:59 -0400 Received: from mail.kernel.org ([198.145.29.99]:44116 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731775AbfCZGd6 (ORCPT ); Tue, 26 Mar 2019 02:33:58 -0400 Received: from localhost (unknown [104.132.152.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9185020857; Tue, 26 Mar 2019 06:33:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553582038; bh=88Zd9Vu4cuW9cvnJF6y0OEBFnoOGcmuQvo9LpmTL2aM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=BHLflrHRlpIHE3ODi4Ey2BSWI2ymiwvFoPsSFoIWxTHrV5aG8Wi5gyoJu+i20H0mt Ut/J9vn82cM7/tiQtp2adfZsCd46thaF7lfu/AAo11eXtyRgApMf7yW3qwyiTZseSZ fd4pns14WvE7TeLQGt8WugLyJpBZmLly7kpjEuyA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+017a32f149406df32703@syzkaller.appspotmail.com, Myungho Jung , Marcel Holtmann Subject: [PATCH 4.14 19/41] Bluetooth: hci_uart: Check if socket buffer is ERR_PTR in h4_recv_buf() Date: Tue, 26 Mar 2019 15:29:56 +0900 Message-Id: <20190326042650.963542802@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190326042649.889479098@linuxfoundation.org> References: <20190326042649.889479098@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Myungho Jung commit 1dc2d785156cbdc80806c32e8d2c7c735d0b4721 upstream. h4_recv_buf() callers store the return value to socket buffer and recursively pass the buffer to h4_recv_buf() without protection. So, ERR_PTR returned from h4_recv_buf() can be dereferenced, if called again before setting the socket buffer to NULL from previous error. Check if skb is ERR_PTR in h4_recv_buf(). Reported-by: syzbot+017a32f149406df32703@syzkaller.appspotmail.com Signed-off-by: Myungho Jung Signed-off-by: Marcel Holtmann Signed-off-by: Greg Kroah-Hartman --- drivers/bluetooth/hci_h4.c | 4 ++++ 1 file changed, 4 insertions(+) --- a/drivers/bluetooth/hci_h4.c +++ b/drivers/bluetooth/hci_h4.c @@ -174,6 +174,10 @@ struct sk_buff *h4_recv_buf(struct hci_d struct hci_uart *hu = hci_get_drvdata(hdev); u8 alignment = hu->alignment ? hu->alignment : 1; + /* Check for error from previous call */ + if (IS_ERR(skb)) + skb = NULL; + while (count) { int i, len;