Browse code

bluez: Version upgrade to v5.71

This commit also fixes following CVE's:

CVE-2023-44431, CVE-2023-51580, CVE-2023-51589,
CVE-2023-51592 and CVE-2023-51596

Change-Id: Ia5026a0432549cf7271dcf6acb268046e8c26ff9
Reviewed-on: http://photon-jenkins.eng.vmware.com:8082/c/photon/+/23653
Tested-by: Shreenidhi Shedi <shreenidhi.shedi@broadcom.com>
Reviewed-by: Shreenidhi Shedi <shreenidhi.shedi@broadcom.com>
Reviewed-by: gerrit-photon <photon-checkins@vmware.com>

Nitesh authored on 2024/04/02 18:28:08
Showing 5 changed files
... ...
@@ -1,7 +1,7 @@
1 1
 Summary:       A set of tools to manage bluetooth devices for linux
2 2
 Name:          bluez-tools
3 3
 Version:       0.2.0.20140808
4
-Release:       5%{?dist}
4
+Release:       6%{?dist}
5 5
 License:       GPL
6 6
 Group:         Applications/Communication
7 7
 Vendor:        VMware, Inc.
... ...
@@ -46,6 +46,8 @@ make DESTDIR=%{buildroot} install %{?_smp_mflags}
46 46
 %doc AUTHORS COPYING
47 47
 
48 48
 %changelog
49
+* Tue Apr 02 2024 Nitesh Kumar <nitesh-nk.kumar@broadcom.com> 0.2.0.20140808-6
50
+- Version Bump up to consume bluez v5.71
49 51
 * Fri Dec 16 2022 Nitesh Kumar <kunitesh@vmware.com> 0.2.0.20140808-5
50 52
 - Version Bump up to consume bluez v5.66
51 53
 * Fri Sep 16 2022 Nitesh Kumar <kunitesh@vmware.com> 0.2.0.20140808-4
52 54
deleted file mode 100644
... ...
@@ -1,44 +0,0 @@
1
-From f54299a850676d92c3dafd83e9174fcfe420ccc9 Mon Sep 17 00:00:00 2001
2
-From: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
3
-Date: Wed, 22 Mar 2023 11:34:24 -0700
4
-Subject: [PATCH] avrcp: Fix crash while handling unsupported events
5
-
6
-The following crash can be observed if the remote peer send and
7
-unsupported event:
8
-
9
-ERROR: AddressSanitizer: heap-use-after-free on address 0x60b000148f11
10
- at pc 0x559644552088 bp 0x7ffe28b3c7b0 sp 0x7ffe28b3c7a0
11
- WRITE of size 1 at 0x60b000148f11 thread T0
12
-     #0 0x559644552087 in avrcp_handle_event profiles/audio/avrcp.c:3907
13
-     #1 0x559644536c22 in control_response profiles/audio/avctp.c:939
14
-     #2 0x5596445379ab in session_cb profiles/audio/avctp.c:1108
15
-     #3 0x7fbcb3e51c43 in g_main_context_dispatch (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x55c43)
16
-     #4 0x7fbcb3ea66c7  (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0xaa6c7)
17
-     #5 0x7fbcb3e512b2 in g_main_loop_run (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x552b2)
18
-     #6 0x559644754ab6 in mainloop_run src/shared/mainloop-glib.c:66
19
-     #7 0x559644755606 in mainloop_run_with_signal src/shared/mainloop-notify.c:188
20
-     #8 0x5596445bb963 in main src/main.c:1289
21
-     #9 0x7fbcb3bafd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
22
-     #10 0x7fbcb3bafe3f in __libc_start_main_impl ../csu/libc-start.c:392
23
-     #11 0x5596444e8224 in _start (/usr/local/libexec/bluetooth/bluetoothd+0xf0224)
24
- profiles/audio/avrcp.c | 6 ++++++
25
- 1 file changed, 6 insertions(+)
26
-
27
-diff --git a/profiles/audio/avrcp.c b/profiles/audio/avrcp.c
28
-index 80f34c7a77..dda9a303fb 100644
29
-+++ b/profiles/audio/avrcp.c
30
-@@ -3901,6 +3901,12 @@ static gboolean avrcp_handle_event(struct avctp *conn, uint8_t code,
31
- 	case AVRCP_EVENT_UIDS_CHANGED:
32
- 		avrcp_uids_changed(session, pdu);
33
- 		break;
34
-+	default:
35
-+		if (event > AVRCP_EVENT_LAST) {
36
-+			warn("Unsupported event: %u", event);
37
-+			return FALSE;
38
-+		}
39
-+		break;
40
- 	}
41
- 
42
- 	session->registered_events |= (1 << event);
43 1
deleted file mode 100644
... ...
@@ -1,63 +0,0 @@
1
-From 5ab5352531a9cc7058cce569607f3a6831464443 Mon Sep 17 00:00:00 2001
2
-From: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
3
-Date: Tue, 19 Sep 2023 12:14:01 -0700
4
-Subject: [PATCH] pbap: Fix not checking Primary/Secundary Counter length
5
-
6
-Primary/Secundary Counters are supposed to be 16 bytes values, if the
7
-server has implemented them incorrectly it may lead to the following
8
-crash:
9
-
10
-=================================================================
11
-==31860==ERROR: AddressSanitizer: heap-buffer-overflow on address
12
-0x607000001878 at pc 0x7f95a1575638 bp 0x7fff58c6bb80 sp 0x7fff58c6b328
13
-
14
- READ of size 48 at 0x607000001878 thread T0
15
-     #0 0x7f95a1575637 in MemcmpInterceptorCommon(void*, int (*)(void const*, void const*, unsigned long), void const*, void const*, unsigned long) ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:860
16
-     #1 0x7f95a1575ba6 in __interceptor_memcmp ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:892
17
-     #2 0x7f95a1575ba6 in __interceptor_memcmp ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:887
18
-     #3 0x564df69c77a0 in read_version obexd/client/pbap.c:288
19
-     #4 0x564df69c77a0 in read_return_apparam obexd/client/pbap.c:352
20
-     #5 0x564df69c77a0 in phonebook_size_callback obexd/client/pbap.c:374
21
-     #6 0x564df69bea3c in session_terminate_transfer obexd/client/session.c:921
22
-     #7 0x564df69d56b0 in get_xfer_progress_first obexd/client/transfer.c:729
23
-     #8 0x564df698b9ee in handle_response gobex/gobex.c:1140
24
-     #9 0x564df698cdea in incoming_data gobex/gobex.c:1385
25
-     #10 0x7f95a12fdc43 in g_main_context_dispatch (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x55c43)
26
-     #11 0x7f95a13526c7  (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0xaa6c7)
27
-     #12 0x7f95a12fd2b2 in g_main_loop_run (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x552b2)
28
-     #13 0x564df6977d41 in main obexd/src/main.c:307
29
-     #14 0x7f95a10a7d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
30
-     #15 0x7f95a10a7e3f in __libc_start_main_impl ../csu/libc-start.c:392
31
-     #16 0x564df6978704 in _start (/usr/local/libexec/bluetooth/obexd+0x8b704)
32
- 0x607000001878 is located 0 bytes to the right of 72-byte region [0x607000001830,0x607000001878)
33
-
34
- allocated by thread T0 here:
35
-     #0 0x7f95a1595a37 in __interceptor_calloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:154
36
-     #1 0x564df69c8b6a in pbap_probe obexd/client/pbap.c:1259
37
- obexd/client/pbap.c | 5 +++--
38
- 1 file changed, 3 insertions(+), 2 deletions(-)
39
-
40
-diff --git a/obexd/client/pbap.c b/obexd/client/pbap.c
41
-index 1ed8c68ecc..2d2aa95089 100644
42
-+++ b/obexd/client/pbap.c
43
-@@ -285,7 +285,7 @@ static void read_version(struct pbap_data *pbap, GObexApparam *apparam)
44
- 		data = value;
45
- 	}
46
- 
47
--	if (memcmp(pbap->primary, data, len)) {
48
-+	if (len == sizeof(pbap->primary) && memcmp(pbap->primary, data, len)) {
49
- 		memcpy(pbap->primary, data, len);
50
- 		g_dbus_emit_property_changed(conn,
51
- 					obc_session_get_path(pbap->session),
52
-@@ -299,7 +299,8 @@ static void read_version(struct pbap_data *pbap, GObexApparam *apparam)
53
- 		data = value;
54
- 	}
55
- 
56
--	if (memcmp(pbap->secondary, data, len)) {
57
-+	if (len == sizeof(pbap->secondary) &&
58
-+			memcmp(pbap->secondary, data, len)) {
59
- 		memcpy(pbap->secondary, data, len);
60
- 		g_dbus_emit_property_changed(conn,
61
- 					obc_session_get_path(pbap->session),
... ...
@@ -1,7 +1,7 @@
1 1
 Summary:        Bluetooth utilities
2 2
 Name:           bluez
3
-Version:        5.66
4
-Release:        4%{?dist}
3
+Version:        5.71
4
+Release:        1%{?dist}
5 5
 License:        GPLv2+
6 6
 Group:          Applications/System
7 7
 Vendor:         VMware, Inc.
... ...
@@ -9,10 +9,7 @@ Distribution:   Photon
9 9
 URL:            http://www.bluez.org
10 10
 
11 11
 Source0: http://www.kernel.org/pub/linux/bluetooth/bluez-%{version}.tar.xz
12
-%define sha512 %{name}=ed0994932687eacf27207867366671b323671f5d5199daf36ea5eff8f254f2bc99ef989ef7df9883b35c06f2af60452be8bad0a06109428a4717cf2b247b4865
13
-
14
-Patch0: bluez-CVE-2023-27349.patch
15
-Patch1: bluez-CVE-2023-50229-50230.patch
12
+%define sha512 %{name}=648394bbe470405aa0e2d3914474e95c122f567deaaac20a5dd74bac29fa430dfb64cdb7bdb4fb7510e62fa73e96112a97197fc212b421bf480b8d1bb24cfb5d
16 13
 
17 14
 BuildRequires:  libical-devel
18 15
 BuildRequires:  glib-devel
... ...
@@ -77,7 +74,7 @@ make %{?_smp_mflags} -k check
77 77
 %{_datadir}/dbus-1/services/org.bluez.obex.service
78 78
 %{_libdir}/systemd/user/obex.service
79 79
 %{_unitdir}/bluetooth.service
80
-%config(noreplace) %{_sysconfdir}/dbus-1/system.d/bluetooth.conf
80
+%config(noreplace) %{_datadir}/dbus-1/system.d/bluetooth.conf
81 81
 
82 82
 %files devel
83 83
 %defattr(-,root,root)
... ...
@@ -87,6 +84,10 @@ make %{?_smp_mflags} -k check
87 87
 %{_datadir}/man/*
88 88
 
89 89
 %changelog
90
+* Tue Apr 02 2024 Nitesh Kumar <nitesh-nk.kumar@broadcom.com> 5.71-1
91
+- Version upgrade to v5.71 to fix following CVE's:
92
+- CVE-2023-44431, CVE-2023-51580, CVE-2023-51589,
93
+- CVE-2023-51592 and CVE-2023-51596
90 94
 * Fri Mar 22 2024 Nitesh Kumar <nitesh-nk.kumar@broadcom.com> 5.66-4
91 95
 - Patched to fix CVE-2023-50229 and CVE-2023-50230
92 96
 * Fri May 12 2023 Nitesh Kumar <kunitesh@vmware.com> 5.66-3
... ...
@@ -1,6 +1,6 @@
1 1
 Name:           gpsd
2 2
 Version:        3.25
3
-Release:        3%{?dist}
3
+Release:        4%{?dist}
4 4
 Summary:        Service daemon for mediating access to a GPS
5 5
 Group:          System Environment
6 6
 Vendor:         VMware, Inc.
... ...
@@ -229,6 +229,8 @@ install -p -m 0755 gpsinit %{buildroot}%{_sbindir}
229 229
 %exclude %{_datadir}/%{name}/gpsd-logo.png
230 230
 
231 231
 %changelog
232
+* Tue Apr 02 2024 Nitesh Kumar <nitesh-nk.kumar@broadcom.com> 3.25-4
233
+- Version Bump up to consume bluez v5.71
232 234
 * Tue Oct 24 2023 Shreenidhi Shedi <sshedi@vmware.com> 3.25-3
233 235
 - Bump version as a part of scons upgrade
234 236
 * Thu Sep 14 2023 Shreenidhi Shedi <sshedi@vmware.com> 3.25-2