* [PATCH v3] Bluetooth: btmtk: validate WMT event SKB length before struct access
@ 2026-04-17 10:29 Tristan Madani
2026-04-17 11:12 ` [v3] " bluez.test.bot
0 siblings, 1 reply; 2+ messages in thread
From: Tristan Madani @ 2026-04-17 10:29 UTC (permalink / raw)
To: linux-bluetooth
Cc: luiz.dentz, marcel, sean.wang, mark-yw.chen, linux-mediatek,
stable
From: Tristan Madani <tristan@talencesecurity.com>
btmtk_usb_hci_wmt_sync() casts the WMT event response SKB data to
struct btmtk_hci_wmt_evt (7 bytes) and struct btmtk_hci_wmt_evt_funcc
(9 bytes) without first checking that the SKB contains enough data.
A short firmware response causes out-of-bounds reads from SKB tailroom.
Add length validation before each struct access to prevent OOB reads
from malformed WMT event responses.
Fixes: d019930b0049 ("Bluetooth: btmtk: move btusb_mtk_hci_wmt_sync to btmtk.c")
Cc: stable@vger.kernel.org
Signed-off-by: Tristan Madani <tristan@talencesecurity.com>
---
drivers/bluetooth/btmtk.c | 10 ++++++++++
1 file changed, 10 insertions(+)
diff --git a/drivers/bluetooth/btmtk.c b/drivers/bluetooth/btmtk.c
index 6fb6ca274..b1a96ebae 100644
--- a/drivers/bluetooth/btmtk.c
+++ b/drivers/bluetooth/btmtk.c
@@ -695,6 +695,12 @@ static int btmtk_usb_hci_wmt_sync(struct hci_dev *hdev,
if (data->evt_skb == NULL)
goto err_free_wc;
+ /* Validate SKB length before accessing WMT event structs */
+ if (data->evt_skb->len < sizeof(*wmt_evt)) {
+ err = -EINVAL;
+ goto err_free_skb;
+ }
+
/* Parse and handle the return WMT event */
wmt_evt = (struct btmtk_hci_wmt_evt *)data->evt_skb->data;
if (wmt_evt->whdr.op != hdr->op) {
@@ -712,6 +718,10 @@ static int btmtk_usb_hci_wmt_sync(struct hci_dev *hdev,
status = BTMTK_WMT_PATCH_DONE;
break;
case BTMTK_WMT_FUNC_CTRL:
+ if (data->evt_skb->len < sizeof(*wmt_evt_funcc)) {
+ err = -EINVAL;
+ goto err_free_skb;
+ }
wmt_evt_funcc = (struct btmtk_hci_wmt_evt_funcc *)wmt_evt;
if (be16_to_cpu(wmt_evt_funcc->status) == 0x404)
status = BTMTK_WMT_ON_DONE;
--
2.47.3
^ permalink raw reply related [flat|nested] 2+ messages in thread
* RE: [v3] Bluetooth: btmtk: validate WMT event SKB length before struct access
2026-04-17 10:29 [PATCH v3] Bluetooth: btmtk: validate WMT event SKB length before struct access Tristan Madani
@ 2026-04-17 11:12 ` bluez.test.bot
0 siblings, 0 replies; 2+ messages in thread
From: bluez.test.bot @ 2026-04-17 11:12 UTC (permalink / raw)
To: linux-bluetooth, tristmd
[-- Attachment #1: Type: text/plain, Size: 881 bytes --]
This is automated email and please do not reply to this email!
Dear submitter,
Thank you for submitting the patches to the linux bluetooth mailing list.
This is a CI test results with your patch series:
PW Link:https://patchwork.kernel.org/project/bluetooth/list/?series=1082459
---Test result---
Test Summary:
CheckPatch PASS 0.55 seconds
GitLint PASS 0.20 seconds
SubjectPrefix PASS 0.06 seconds
BuildKernel PASS 25.96 seconds
CheckAllWarning PASS 28.76 seconds
CheckSparse PASS 27.37 seconds
BuildKernel32 PASS 25.48 seconds
TestRunnerSetup PASS 564.82 seconds
IncrementalBuild PASS 24.17 seconds
https://github.com/bluez/bluetooth-next/pull/98
---
Regards,
Linux Bluetooth
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2026-04-17 11:12 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-04-17 10:29 [PATCH v3] Bluetooth: btmtk: validate WMT event SKB length before struct access Tristan Madani
2026-04-17 11:12 ` [v3] " bluez.test.bot
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox