Bluetooth: Fix potential NULL pointer dereference in smp_conn_security
authorJohan Hedberg <johan.hedberg@intel.com>
Mon, 24 Mar 2014 15:36:25 +0000 (17:36 +0200)
committerMarcel Holtmann <marcel@holtmann.org>
Mon, 24 Mar 2014 15:43:47 +0000 (08:43 -0700)
The smp pointer might not be initialized for jumps to the "done" label
in the smp_conn_security function. Furthermore doing the set_bit after
done might "overwrite" a previous value of the flag in case pairing was
already in progress. This patch moves the call to set_bit before the
label so that it is only done for a newly created smp context (as
returned by smp_chan_create).

Signed-off-by: Johan Hedberg <johan.hedberg@intel.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
net/bluetooth/smp.c

index 10a8e622ab2bc5016475d25119f233a4f1e1b03a..c654c5880912843ae3ce3c970c336f2d444633e8 100644 (file)
@@ -930,9 +930,9 @@ int smp_conn_security(struct hci_conn *hcon, __u8 sec_level)
                smp_send_cmd(conn, SMP_CMD_SECURITY_REQ, sizeof(cp), &cp);
        }
 
-done:
        set_bit(SMP_FLAG_INITIATOR, &smp->smp_flags);
 
+done:
        hcon->pending_sec_level = sec_level;
 
        return 0;