Skip to content

[SECURITY] Bluetooth: fix OOB read in hci_extended_inquiry_result_evt() (CVE-2020-36386)#141

Open
Mifacopy wants to merge 1 commit intofacebookincubator:oculus-go-kernel-masterfrom
Mifacopy:patch-37
Open

[SECURITY] Bluetooth: fix OOB read in hci_extended_inquiry_result_evt() (CVE-2020-36386)#141
Mifacopy wants to merge 1 commit intofacebookincubator:oculus-go-kernel-masterfrom
Mifacopy:patch-37

Conversation

@Mifacopy
Copy link

Fix CVE-2020-36386.

Upstream commit: 51c19bf3d5cfaa66571e4b88ba2a6f6295311101

hci_extended_inquiry_result_evt() only checked that num_rsp != 0, but did not
validate that the skb contains enough bytes for num_rsp * sizeof(*info) plus
the trailing byte. A malformed HCI event with a large num_rsp can therefore
trigger a slab out-of-bounds read, leading to kernel crash/DoS and potential
info exposure.

Add an skb length sanity check and bail out on malformed packets.

Reference: CVE-2020-36386

@meta-cla meta-cla bot added the CLA Signed Do not delete this pull request or issue due to inactivity. label Feb 15, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

CLA Signed Do not delete this pull request or issue due to inactivity.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant