diff options
| author | Brian Delwiche <delwiche@google.com> | 2024-10-09 20:55:36 +0000 |
|---|---|---|
| committer | aoleary <seanm187@gmail.com> | 2025-07-08 08:55:56 +0000 |
| commit | 42e50fe2ac50f498dbdc7fb582ccf26182253892 (patch) | |
| tree | 15cef7b42deeaaa22f0392d54145664501cc32c8 /tools/rootcanal/scripts/send_simple_commands.py | |
| parent | 6081a8c19c850dce073023e198be6cd250817132 (diff) | |
Fix UAF in sdp_discovery.cc
It is possible with modifications to a client to open two connections
against the same SDP discovery database. If this happens, it becomes
possible to reference a freed instance of the discovery database in the
second connection once the first one is closed.
To guard against this, check during discovery if a database has already
been allocated, and abort iff it has.
Also, add a null check to process_service_search_attr_rsp to guard
against unchecked calls to the SDP discovery database.
Bug: 291281168
Bug: 356201480
Flag: com.android.bluetooth.flags.btsec_check_valid_discovery_database
Test: atest bluetooth_test_gd_unit, net_test_stack_sdp
Tag: #security
Ignore-AOSP-First: Security
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:2c3b80e41630d9a252e63a3e30cc2997488fc3e4)
Merged-In: I754bf8292e1e0d8e90e78fa87889284e26aa5818
Change-Id: I754bf8292e1e0d8e90e78fa87889284e26aa5818
Diffstat (limited to 'tools/rootcanal/scripts/send_simple_commands.py')
0 files changed, 0 insertions, 0 deletions
