[Bluetooth] Restrict well known PSM to privileged users
The PSM values below 0x1001 of L2CAP are reserved for well known services. Restrict the possibility to bind them to privileged users. Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
This commit is contained in:
parent
7386397636
commit
847641d7db
1 changed files with 6 additions and 0 deletions
|
@ -585,6 +585,12 @@ static int l2cap_sock_bind(struct socket *sock, struct sockaddr *addr, int addr_
|
||||||
goto done;
|
goto done;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (la->l2_psm > 0 && btohs(la->l2_psm) < 0x1001 &&
|
||||||
|
!capable(CAP_NET_BIND_SERVICE)) {
|
||||||
|
err = -EACCES;
|
||||||
|
goto done;
|
||||||
|
}
|
||||||
|
|
||||||
write_lock_bh(&l2cap_sk_list.lock);
|
write_lock_bh(&l2cap_sk_list.lock);
|
||||||
|
|
||||||
if (la->l2_psm && __l2cap_get_sock_by_addr(la->l2_psm, &la->l2_bdaddr)) {
|
if (la->l2_psm && __l2cap_get_sock_by_addr(la->l2_psm, &la->l2_bdaddr)) {
|
||||||
|
|
Loading…
Reference in a new issue