diff options
-rw-r--r-- | main/bluez/APKBUILD | 18 | ||||
-rw-r--r-- | main/bluez/CVE-2017-1000250.patch | 25 |
2 files changed, 38 insertions, 5 deletions
diff --git a/main/bluez/APKBUILD b/main/bluez/APKBUILD index f76e76d2193..6b9a88d4c60 100644 --- a/main/bluez/APKBUILD +++ b/main/bluez/APKBUILD @@ -1,7 +1,7 @@ # Maintainer: Natanael Copa <ncopa@alpinelinux.org> pkgname=bluez pkgver=5.36 -pkgrel=0 +pkgrel=1 pkgdesc="Tools for the Bluetooth protocol stack" url="http://www.bluez.org/" arch="all" @@ -18,9 +18,14 @@ source="http://www.kernel.org/pub/linux/bluetooth/bluez-$pkgver.tar.xz bluetooth.initd rfcomm.initd rfcomm.confd + CVE-2017-1000250.patch " - _builddir="$srcdir"/bluez-$pkgver + +# secfixes: +# 5.36-r1: +# - CVE-2017-1000250 + prepare() { cd "$_builddir" for i in $source; do @@ -74,12 +79,15 @@ hid2hci() { md5sums="9a0ee479cacc44fac68f6a65b1cd3eba bluez-5.36.tar.xz 4ec3395eff42b3481a0a77f36ca57d0b bluetooth.initd f90b2cc8fe3f0e4bed64b01c0ba0205d rfcomm.initd -7f4bb093adb0f519c621f2ea68712f35 rfcomm.confd" +7f4bb093adb0f519c621f2ea68712f35 rfcomm.confd +caf97389e55729d120bfef92e3f4f91f CVE-2017-1000250.patch" sha256sums="a343ea1aeb53d3bd139087f3b1c1e1fb70db452d9762cc7a3d23e75962e578f2 bluez-5.36.tar.xz 04395bdcbf69aafea1d127204677c72a6bf42bde1e8f809d31472ec5fa75057d bluetooth.initd 9407186d0a647af2228d5603a13cf7aaba5fac842c147aa46334c3d729b552d4 rfcomm.initd -672498957049fd301f9c9c1dc9fa49430e5e6d3c3f1f3cdce80df3af7d425d08 rfcomm.confd" +672498957049fd301f9c9c1dc9fa49430e5e6d3c3f1f3cdce80df3af7d425d08 rfcomm.confd +c82c11e89ef474fd3efecaa6b872fb995262a01fe96fe67297d8dbff70994996 CVE-2017-1000250.patch" sha512sums="2cff79533d052d5b718101d31093cce34849dd316a41597384d0e777679ca96d83537f0cf7a5d7a1d5919c8f2afdd7164536b104cba616dde230e774c55774c3 bluez-5.36.tar.xz 0a5c652effebe5f2fd968535b2d99e8b9b6983f847fd162f80e5965ade4b7bd12165d27b348506a08503d1bc8c2cf5c8265758ca1e9670dfb5e765edf121fd96 bluetooth.initd 8d7b7c8938a2316ce0a855e9bdf1ef8fcdf33d23f4011df828270a088b88b140a19c432e83fef15355d0829e3c86be05b63e7718fef88563254ea239b8dc12ac rfcomm.initd -a70aa0dbbabe7e29ee81540a6f98bf191a850da55a28f678975635caf34b363cf4d461a801b3484120ee28fdd21240bd456a4f5d706262700924bd2e9a0972fb rfcomm.confd" +a70aa0dbbabe7e29ee81540a6f98bf191a850da55a28f678975635caf34b363cf4d461a801b3484120ee28fdd21240bd456a4f5d706262700924bd2e9a0972fb rfcomm.confd +cb230dc193c8bee6fb297b5ef33fefc91feba8d780f4e7127b648835e3c4445ce9ac05ad6a1cf5bcf470d3c6750424f7193e45ad0ad3f236da8240422cdeba81 CVE-2017-1000250.patch" diff --git a/main/bluez/CVE-2017-1000250.patch b/main/bluez/CVE-2017-1000250.patch new file mode 100644 index 00000000000..f088ef38f2f --- /dev/null +++ b/main/bluez/CVE-2017-1000250.patch @@ -0,0 +1,25 @@ +From 9e009647b14e810e06626dde7f1bb9ea3c375d09 Mon Sep 17 00:00:00 2001 +From: Luiz Augusto von Dentz <luiz.von.dentz@intel.com> +Date: Wed, 13 Sep 2017 10:01:40 +0300 +Subject: sdp: Fix Out-of-bounds heap read in service_search_attr_req function + +Check if there is enough data to continue otherwise return an error. +--- + src/sdpd-request.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/src/sdpd-request.c b/src/sdpd-request.c +index 1eefdce..318d044 100644 +--- a/src/sdpd-request.c ++++ b/src/sdpd-request.c +@@ -917,7 +917,7 @@ static int service_search_attr_req(sdp_req_t *req, sdp_buf_t *buf) + } else { + /* continuation State exists -> get from cache */ + sdp_buf_t *pCache = sdp_get_cached_rsp(cstate); +- if (pCache) { ++ if (pCache && cstate->cStateValue.maxBytesSent < pCache->data_size) { + uint16_t sent = MIN(max, pCache->data_size - cstate->cStateValue.maxBytesSent); + pResponse = pCache->data; + memcpy(buf->data, pResponse + cstate->cStateValue.maxBytesSent, sent); +-- +cgit v1.1 |