diff options
author | Johan Hedberg <johan.hedberg@intel.com> | 2015-01-14 20:51:37 +0200 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2015-03-06 14:52:44 -0800 |
commit | f879c09458deaffbbde453fb95d0117a014fdb72 (patch) | |
tree | 355ec1c8ebc8f4edaa89172c3d46fc25244e5063 | |
parent | c86e12f0192b1c700ba884b6db1957fe7b79d2b3 (diff) |
Bluetooth: Fix valid Identity Address check
commit e12af489b91d47a806f4e96e4edc20df612482e7 upstream.
According to the Bluetooth core specification valid identity addresses
are either Public Device Addresses or Static Random Addresses. IRKs
received with any other type of address should be discarded since we
cannot assume to know the permanent identity of the peer device.
This patch fixes a missing check for the Identity Address when receiving
the Identity Address Information SMP PDU.
Signed-off-by: Johan Hedberg <johan.hedberg@intel.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r-- | net/bluetooth/smp.c | 6 |
1 files changed, 5 insertions, 1 deletions
diff --git a/net/bluetooth/smp.c b/net/bluetooth/smp.c index f09b6b65cf6b..9ebc394ea5e5 100644 --- a/net/bluetooth/smp.c +++ b/net/bluetooth/smp.c @@ -1392,8 +1392,12 @@ static int smp_cmd_ident_addr_info(struct l2cap_conn *conn, * implementations are not known of and in order to not over * complicate our implementation, simply pretend that we never * received an IRK for such a device. + * + * The Identity Address must also be a Static Random or Public + * Address, which hci_is_identity_address() checks for. */ - if (!bacmp(&info->bdaddr, BDADDR_ANY)) { + if (!bacmp(&info->bdaddr, BDADDR_ANY) || + !hci_is_identity_address(&info->bdaddr, info->addr_type)) { BT_ERR("Ignoring IRK with no identity address"); goto distribute; } |