aboutsummaryrefslogtreecommitdiff
path: root/system/tools/scripts/yapf_checker.py
diff options
context:
space:
mode:
authorBrian Delwiche <delwiche@google.com>2024-10-09 20:55:36 +0000
committeraoleary <seanm187@gmail.com>2025-07-08 08:55:56 +0000
commit42e50fe2ac50f498dbdc7fb582ccf26182253892 (patch)
tree15cef7b42deeaaa22f0392d54145664501cc32c8 /system/tools/scripts/yapf_checker.py
parent6081a8c19c850dce073023e198be6cd250817132 (diff)
Fix UAF in sdp_discovery.cc
It is possible with modifications to a client to open two connections against the same SDP discovery database. If this happens, it becomes possible to reference a freed instance of the discovery database in the second connection once the first one is closed. To guard against this, check during discovery if a database has already been allocated, and abort iff it has. Also, add a null check to process_service_search_attr_rsp to guard against unchecked calls to the SDP discovery database. Bug: 291281168 Bug: 356201480 Flag: com.android.bluetooth.flags.btsec_check_valid_discovery_database Test: atest bluetooth_test_gd_unit, net_test_stack_sdp Tag: #security Ignore-AOSP-First: Security (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:2c3b80e41630d9a252e63a3e30cc2997488fc3e4) Merged-In: I754bf8292e1e0d8e90e78fa87889284e26aa5818 Change-Id: I754bf8292e1e0d8e90e78fa87889284e26aa5818
Diffstat (limited to 'system/tools/scripts/yapf_checker.py')
0 files changed, 0 insertions, 0 deletions