Join GitHub today
GitHub is home to over 20 million developers working together to host and review code, manage projects, and build software together.
Bluetooth: Properly check L2CAP config option output buffer length #1
Conversation
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
mariogrip commentedSep 28, 2017
Patch for Blueborne (CVE-2017-1000251)
From: Ben Seri ben@armis.com
commit e860d2c904d1a9f38a24eb44c9f34b8f915a6ea3 upstream.
Validate the output buffer length for L2CAP config requests and responses
to avoid overflowing the stack buffer used for building the option blocks.
Signed-off-by: Ben Seri ben@armis.com
Signed-off-by: Marcel Holtmann marcel@holtmann.org
Signed-off-by: Linus Torvalds torvalds@linux-foundation.org
Signed-off-by: Greg Kroah-Hartman gregkh@linuxfoundation.orgFrom: Ben Seri ben@armis.com
commit e860d2c904d1a9f38a24eb44c9f34b8f915a6ea3 upstream.
Validate the output buffer length for L2CAP config requests and responses
to avoid overflowing the stack buffer used for building the option blocks.
Signed-off-by: Ben Seri ben@armis.com
Signed-off-by: Marcel Holtmann marcel@holtmann.org
Signed-off-by: Linus Torvalds torvalds@linux-foundation.org
Signed-off-by: Greg Kroah-Hartman gregkh@linuxfoundation.org