This commit also fixes following CVE's:
CVE-2023-44431, CVE-2023-51580, CVE-2023-51589,
CVE-2023-51592 and CVE-2023-51596
Change-Id: Ia5026a0432549cf7271dcf6acb268046e8c26ff9
Reviewed-on: http://photon-jenkins.eng.vmware.com:8082/c/photon/+/23653
Tested-by: Shreenidhi Shedi <shreenidhi.shedi@broadcom.com>
Reviewed-by: Shreenidhi Shedi <shreenidhi.shedi@broadcom.com>
Reviewed-by: gerrit-photon <photon-checkins@vmware.com>
| ... | ... |
@@ -1,7 +1,7 @@ |
| 1 | 1 |
Summary: A set of tools to manage bluetooth devices for linux |
| 2 | 2 |
Name: bluez-tools |
| 3 | 3 |
Version: 0.2.0.20140808 |
| 4 |
-Release: 5%{?dist}
|
|
| 4 |
+Release: 6%{?dist}
|
|
| 5 | 5 |
License: GPL |
| 6 | 6 |
Group: Applications/Communication |
| 7 | 7 |
Vendor: VMware, Inc. |
| ... | ... |
@@ -46,6 +46,8 @@ make DESTDIR=%{buildroot} install %{?_smp_mflags}
|
| 46 | 46 |
%doc AUTHORS COPYING |
| 47 | 47 |
|
| 48 | 48 |
%changelog |
| 49 |
+* Tue Apr 02 2024 Nitesh Kumar <nitesh-nk.kumar@broadcom.com> 0.2.0.20140808-6 |
|
| 50 |
+- Version Bump up to consume bluez v5.71 |
|
| 49 | 51 |
* Fri Dec 16 2022 Nitesh Kumar <kunitesh@vmware.com> 0.2.0.20140808-5 |
| 50 | 52 |
- Version Bump up to consume bluez v5.66 |
| 51 | 53 |
* Fri Sep 16 2022 Nitesh Kumar <kunitesh@vmware.com> 0.2.0.20140808-4 |
| 52 | 54 |
deleted file mode 100644 |
| ... | ... |
@@ -1,44 +0,0 @@ |
| 1 |
-From f54299a850676d92c3dafd83e9174fcfe420ccc9 Mon Sep 17 00:00:00 2001 |
|
| 2 |
-From: Luiz Augusto von Dentz <luiz.von.dentz@intel.com> |
|
| 3 |
-Date: Wed, 22 Mar 2023 11:34:24 -0700 |
|
| 4 |
-Subject: [PATCH] avrcp: Fix crash while handling unsupported events |
|
| 5 |
- |
|
| 6 |
-The following crash can be observed if the remote peer send and |
|
| 7 |
-unsupported event: |
|
| 8 |
- |
|
| 9 |
-ERROR: AddressSanitizer: heap-use-after-free on address 0x60b000148f11 |
|
| 10 |
- at pc 0x559644552088 bp 0x7ffe28b3c7b0 sp 0x7ffe28b3c7a0 |
|
| 11 |
- WRITE of size 1 at 0x60b000148f11 thread T0 |
|
| 12 |
- #0 0x559644552087 in avrcp_handle_event profiles/audio/avrcp.c:3907 |
|
| 13 |
- #1 0x559644536c22 in control_response profiles/audio/avctp.c:939 |
|
| 14 |
- #2 0x5596445379ab in session_cb profiles/audio/avctp.c:1108 |
|
| 15 |
- #3 0x7fbcb3e51c43 in g_main_context_dispatch (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x55c43) |
|
| 16 |
- #4 0x7fbcb3ea66c7 (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0xaa6c7) |
|
| 17 |
- #5 0x7fbcb3e512b2 in g_main_loop_run (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x552b2) |
|
| 18 |
- #6 0x559644754ab6 in mainloop_run src/shared/mainloop-glib.c:66 |
|
| 19 |
- #7 0x559644755606 in mainloop_run_with_signal src/shared/mainloop-notify.c:188 |
|
| 20 |
- #8 0x5596445bb963 in main src/main.c:1289 |
|
| 21 |
- #9 0x7fbcb3bafd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 |
|
| 22 |
- #10 0x7fbcb3bafe3f in __libc_start_main_impl ../csu/libc-start.c:392 |
|
| 23 |
- #11 0x5596444e8224 in _start (/usr/local/libexec/bluetooth/bluetoothd+0xf0224) |
|
| 24 |
- profiles/audio/avrcp.c | 6 ++++++ |
|
| 25 |
- 1 file changed, 6 insertions(+) |
|
| 26 |
- |
|
| 27 |
-diff --git a/profiles/audio/avrcp.c b/profiles/audio/avrcp.c |
|
| 28 |
-index 80f34c7a77..dda9a303fb 100644 |
|
| 29 |
-+++ b/profiles/audio/avrcp.c |
|
| 30 |
-@@ -3901,6 +3901,12 @@ static gboolean avrcp_handle_event(struct avctp *conn, uint8_t code, |
|
| 31 |
- case AVRCP_EVENT_UIDS_CHANGED: |
|
| 32 |
- avrcp_uids_changed(session, pdu); |
|
| 33 |
- break; |
|
| 34 |
-+ default: |
|
| 35 |
-+ if (event > AVRCP_EVENT_LAST) {
|
|
| 36 |
-+ warn("Unsupported event: %u", event);
|
|
| 37 |
-+ return FALSE; |
|
| 38 |
-+ } |
|
| 39 |
-+ break; |
|
| 40 |
- } |
|
| 41 |
- |
|
| 42 |
- session->registered_events |= (1 << event); |
| 43 | 1 |
deleted file mode 100644 |
| ... | ... |
@@ -1,63 +0,0 @@ |
| 1 |
-From 5ab5352531a9cc7058cce569607f3a6831464443 Mon Sep 17 00:00:00 2001 |
|
| 2 |
-From: Luiz Augusto von Dentz <luiz.von.dentz@intel.com> |
|
| 3 |
-Date: Tue, 19 Sep 2023 12:14:01 -0700 |
|
| 4 |
-Subject: [PATCH] pbap: Fix not checking Primary/Secundary Counter length |
|
| 5 |
- |
|
| 6 |
-Primary/Secundary Counters are supposed to be 16 bytes values, if the |
|
| 7 |
-server has implemented them incorrectly it may lead to the following |
|
| 8 |
-crash: |
|
| 9 |
- |
|
| 10 |
-================================================================= |
|
| 11 |
-==31860==ERROR: AddressSanitizer: heap-buffer-overflow on address |
|
| 12 |
-0x607000001878 at pc 0x7f95a1575638 bp 0x7fff58c6bb80 sp 0x7fff58c6b328 |
|
| 13 |
- |
|
| 14 |
- READ of size 48 at 0x607000001878 thread T0 |
|
| 15 |
- #0 0x7f95a1575637 in MemcmpInterceptorCommon(void*, int (*)(void const*, void const*, unsigned long), void const*, void const*, unsigned long) ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:860 |
|
| 16 |
- #1 0x7f95a1575ba6 in __interceptor_memcmp ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:892 |
|
| 17 |
- #2 0x7f95a1575ba6 in __interceptor_memcmp ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:887 |
|
| 18 |
- #3 0x564df69c77a0 in read_version obexd/client/pbap.c:288 |
|
| 19 |
- #4 0x564df69c77a0 in read_return_apparam obexd/client/pbap.c:352 |
|
| 20 |
- #5 0x564df69c77a0 in phonebook_size_callback obexd/client/pbap.c:374 |
|
| 21 |
- #6 0x564df69bea3c in session_terminate_transfer obexd/client/session.c:921 |
|
| 22 |
- #7 0x564df69d56b0 in get_xfer_progress_first obexd/client/transfer.c:729 |
|
| 23 |
- #8 0x564df698b9ee in handle_response gobex/gobex.c:1140 |
|
| 24 |
- #9 0x564df698cdea in incoming_data gobex/gobex.c:1385 |
|
| 25 |
- #10 0x7f95a12fdc43 in g_main_context_dispatch (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x55c43) |
|
| 26 |
- #11 0x7f95a13526c7 (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0xaa6c7) |
|
| 27 |
- #12 0x7f95a12fd2b2 in g_main_loop_run (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x552b2) |
|
| 28 |
- #13 0x564df6977d41 in main obexd/src/main.c:307 |
|
| 29 |
- #14 0x7f95a10a7d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 |
|
| 30 |
- #15 0x7f95a10a7e3f in __libc_start_main_impl ../csu/libc-start.c:392 |
|
| 31 |
- #16 0x564df6978704 in _start (/usr/local/libexec/bluetooth/obexd+0x8b704) |
|
| 32 |
- 0x607000001878 is located 0 bytes to the right of 72-byte region [0x607000001830,0x607000001878) |
|
| 33 |
- |
|
| 34 |
- allocated by thread T0 here: |
|
| 35 |
- #0 0x7f95a1595a37 in __interceptor_calloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:154 |
|
| 36 |
- #1 0x564df69c8b6a in pbap_probe obexd/client/pbap.c:1259 |
|
| 37 |
- obexd/client/pbap.c | 5 +++-- |
|
| 38 |
- 1 file changed, 3 insertions(+), 2 deletions(-) |
|
| 39 |
- |
|
| 40 |
-diff --git a/obexd/client/pbap.c b/obexd/client/pbap.c |
|
| 41 |
-index 1ed8c68ecc..2d2aa95089 100644 |
|
| 42 |
-+++ b/obexd/client/pbap.c |
|
| 43 |
-@@ -285,7 +285,7 @@ static void read_version(struct pbap_data *pbap, GObexApparam *apparam) |
|
| 44 |
- data = value; |
|
| 45 |
- } |
|
| 46 |
- |
|
| 47 |
-- if (memcmp(pbap->primary, data, len)) {
|
|
| 48 |
-+ if (len == sizeof(pbap->primary) && memcmp(pbap->primary, data, len)) {
|
|
| 49 |
- memcpy(pbap->primary, data, len); |
|
| 50 |
- g_dbus_emit_property_changed(conn, |
|
| 51 |
- obc_session_get_path(pbap->session), |
|
| 52 |
-@@ -299,7 +299,8 @@ static void read_version(struct pbap_data *pbap, GObexApparam *apparam) |
|
| 53 |
- data = value; |
|
| 54 |
- } |
|
| 55 |
- |
|
| 56 |
-- if (memcmp(pbap->secondary, data, len)) {
|
|
| 57 |
-+ if (len == sizeof(pbap->secondary) && |
|
| 58 |
-+ memcmp(pbap->secondary, data, len)) {
|
|
| 59 |
- memcpy(pbap->secondary, data, len); |
|
| 60 |
- g_dbus_emit_property_changed(conn, |
|
| 61 |
- obc_session_get_path(pbap->session), |
| ... | ... |
@@ -1,7 +1,7 @@ |
| 1 | 1 |
Summary: Bluetooth utilities |
| 2 | 2 |
Name: bluez |
| 3 |
-Version: 5.66 |
|
| 4 |
-Release: 4%{?dist}
|
|
| 3 |
+Version: 5.71 |
|
| 4 |
+Release: 1%{?dist}
|
|
| 5 | 5 |
License: GPLv2+ |
| 6 | 6 |
Group: Applications/System |
| 7 | 7 |
Vendor: VMware, Inc. |
| ... | ... |
@@ -9,10 +9,7 @@ Distribution: Photon |
| 9 | 9 |
URL: http://www.bluez.org |
| 10 | 10 |
|
| 11 | 11 |
Source0: http://www.kernel.org/pub/linux/bluetooth/bluez-%{version}.tar.xz
|
| 12 |
-%define sha512 %{name}=ed0994932687eacf27207867366671b323671f5d5199daf36ea5eff8f254f2bc99ef989ef7df9883b35c06f2af60452be8bad0a06109428a4717cf2b247b4865
|
|
| 13 |
- |
|
| 14 |
-Patch0: bluez-CVE-2023-27349.patch |
|
| 15 |
-Patch1: bluez-CVE-2023-50229-50230.patch |
|
| 12 |
+%define sha512 %{name}=648394bbe470405aa0e2d3914474e95c122f567deaaac20a5dd74bac29fa430dfb64cdb7bdb4fb7510e62fa73e96112a97197fc212b421bf480b8d1bb24cfb5d
|
|
| 16 | 13 |
|
| 17 | 14 |
BuildRequires: libical-devel |
| 18 | 15 |
BuildRequires: glib-devel |
| ... | ... |
@@ -77,7 +74,7 @@ make %{?_smp_mflags} -k check
|
| 77 | 77 |
%{_datadir}/dbus-1/services/org.bluez.obex.service
|
| 78 | 78 |
%{_libdir}/systemd/user/obex.service
|
| 79 | 79 |
%{_unitdir}/bluetooth.service
|
| 80 |
-%config(noreplace) %{_sysconfdir}/dbus-1/system.d/bluetooth.conf
|
|
| 80 |
+%config(noreplace) %{_datadir}/dbus-1/system.d/bluetooth.conf
|
|
| 81 | 81 |
|
| 82 | 82 |
%files devel |
| 83 | 83 |
%defattr(-,root,root) |
| ... | ... |
@@ -87,6 +84,10 @@ make %{?_smp_mflags} -k check
|
| 87 | 87 |
%{_datadir}/man/*
|
| 88 | 88 |
|
| 89 | 89 |
%changelog |
| 90 |
+* Tue Apr 02 2024 Nitesh Kumar <nitesh-nk.kumar@broadcom.com> 5.71-1 |
|
| 91 |
+- Version upgrade to v5.71 to fix following CVE's: |
|
| 92 |
+- CVE-2023-44431, CVE-2023-51580, CVE-2023-51589, |
|
| 93 |
+- CVE-2023-51592 and CVE-2023-51596 |
|
| 90 | 94 |
* Fri Mar 22 2024 Nitesh Kumar <nitesh-nk.kumar@broadcom.com> 5.66-4 |
| 91 | 95 |
- Patched to fix CVE-2023-50229 and CVE-2023-50230 |
| 92 | 96 |
* Fri May 12 2023 Nitesh Kumar <kunitesh@vmware.com> 5.66-3 |
| ... | ... |
@@ -1,6 +1,6 @@ |
| 1 | 1 |
Name: gpsd |
| 2 | 2 |
Version: 3.25 |
| 3 |
-Release: 3%{?dist}
|
|
| 3 |
+Release: 4%{?dist}
|
|
| 4 | 4 |
Summary: Service daemon for mediating access to a GPS |
| 5 | 5 |
Group: System Environment |
| 6 | 6 |
Vendor: VMware, Inc. |
| ... | ... |
@@ -229,6 +229,8 @@ install -p -m 0755 gpsinit %{buildroot}%{_sbindir}
|
| 229 | 229 |
%exclude %{_datadir}/%{name}/gpsd-logo.png
|
| 230 | 230 |
|
| 231 | 231 |
%changelog |
| 232 |
+* Tue Apr 02 2024 Nitesh Kumar <nitesh-nk.kumar@broadcom.com> 3.25-4 |
|
| 233 |
+- Version Bump up to consume bluez v5.71 |
|
| 232 | 234 |
* Tue Oct 24 2023 Shreenidhi Shedi <sshedi@vmware.com> 3.25-3 |
| 233 | 235 |
- Bump version as a part of scons upgrade |
| 234 | 236 |
* Thu Sep 14 2023 Shreenidhi Shedi <sshedi@vmware.com> 3.25-2 |