Skip to content

Commit b40cdd1

Browse files
mjbommargregkh
authored andcommitted
Bluetooth: virtio_bt: clamp rx length before skb_put
commit 21bd244 upstream. virtbt_rx_work() calls skb_put(skb, len) where len comes directly from virtqueue_get_buf() with no validation against the buffer we posted to the device. The RX skb is allocated in virtbt_add_inbuf() and exposed to virtio as exactly 1000 bytes via sg_init_one(). Checking len against skb_tailroom(skb) is not sufficient because alloc_skb() can leave more tailroom than the 1000 bytes actually handed to the device. A malicious or buggy backend can therefore report used.len between 1001 and skb_tailroom(skb), causing skb_put() to include uninitialized kernel heap bytes that were never written by the device. The same path also accepts len == 0, in which case skb_put(skb, 0) leaves the skb empty but virtbt_rx_handle() still reads the pkt_type byte from skb->data, consuming uninitialized memory. Define VIRTBT_RX_BUF_SIZE once and reuse it in alloc_skb() and sg_init_one(), and gate virtbt_rx_work() on that same constant so the bound checked matches the buffer actually exposed to the device. Reject used.len == 0 in the same gate so an empty completion can no longer reach virtbt_rx_handle(). Use bt_dev_err_ratelimited() because the length value comes from an untrusted backend that can otherwise flood the kernel log. Same class of bug as commit c04db81 ("net/9p: Fix buffer overflow in USB transport layer"), which hardened the USB 9p transport against unchecked device-reported length. Fixes: 160fbcf ("Bluetooth: virtio_bt: Use skb_put to set length") Cc: stable@vger.kernel.org Cc: Soenke Huster <soenke.huster@eknoes.de> Signed-off-by: Michael Bommarito <michael.bommarito@gmail.com> Assisted-by: Claude:claude-opus-4-7 Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
1 parent 53ad20e commit b40cdd1

1 file changed

Lines changed: 12 additions & 4 deletions

File tree

drivers/bluetooth/virtio_bt.c

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@
1212
#include <net/bluetooth/hci_core.h>
1313

1414
#define VERSION "0.1"
15+
#define VIRTBT_RX_BUF_SIZE 1000
1516

1617
enum {
1718
VIRTBT_VQ_TX,
@@ -33,11 +34,11 @@ static int virtbt_add_inbuf(struct virtio_bluetooth *vbt)
3334
struct sk_buff *skb;
3435
int err;
3536

36-
skb = alloc_skb(1000, GFP_KERNEL);
37+
skb = alloc_skb(VIRTBT_RX_BUF_SIZE, GFP_KERNEL);
3738
if (!skb)
3839
return -ENOMEM;
3940

40-
sg_init_one(sg, skb->data, 1000);
41+
sg_init_one(sg, skb->data, VIRTBT_RX_BUF_SIZE);
4142

4243
err = virtqueue_add_inbuf(vq, sg, 1, skb, GFP_KERNEL);
4344
if (err < 0) {
@@ -227,8 +228,15 @@ static void virtbt_rx_work(struct work_struct *work)
227228
if (!skb)
228229
return;
229230

230-
skb_put(skb, len);
231-
virtbt_rx_handle(vbt, skb);
231+
if (!len || len > VIRTBT_RX_BUF_SIZE) {
232+
bt_dev_err_ratelimited(vbt->hdev,
233+
"rx reply len %u outside [1, %u]\n",
234+
len, VIRTBT_RX_BUF_SIZE);
235+
kfree_skb(skb);
236+
} else {
237+
skb_put(skb, len);
238+
virtbt_rx_handle(vbt, skb);
239+
}
232240

233241
if (virtbt_add_inbuf(vbt) < 0)
234242
return;

0 commit comments

Comments
 (0)