lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20231215183214.1563754-1-luiz.dentz@gmail.com>
Date: Fri, 15 Dec 2023 13:32:13 -0500
From: Luiz Augusto von Dentz <luiz.dentz@...il.com>
To: davem@...emloft.net,
	kuba@...nel.org
Cc: linux-bluetooth@...r.kernel.org,
	netdev@...r.kernel.org
Subject: pull-request: bluetooth 2023-12-15

The following changes since commit 64b8bc7d5f1434c636a40bdcfcd42b278d1714be:

  net/rose: fix races in rose_kill_by_device() (2023-12-15 11:59:53 +0000)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git tags/for-net-2023-12-15

for you to fetch changes up to 2e07e8348ea454615e268222ae3fc240421be768:

  Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg (2023-12-15 11:54:18 -0500)

----------------------------------------------------------------
bluetooth pull request for net:

 - Add encryption key size check when acting as peripheral
 - Shut up false-positive build warning
 - Send reject if L2CAP command request is corrupted
 - Fix Use-After-Free in bt_sock_recvmsg
 - Fix not notifying when connection encryption changes
 - Fix not checking if HCI_OP_INQUIRY has been sent
 - Fix address type send over to the MGMT interface
 - Fix deadlock in vhci_send_frame

----------------------------------------------------------------
Alex Lu (1):
      Bluetooth: Add more enc key size check

Arnd Bergmann (1):
      Bluetooth: hci_event: shut up a false-positive warning

Frédéric Danis (1):
      Bluetooth: L2CAP: Send reject on command corrupted request

Hyunwoo Kim (1):
      Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg

Luiz Augusto von Dentz (3):
      Bluetooth: Fix not notifying when connection encryption changes
      Bluetooth: hci_event: Fix not checking if HCI_OP_INQUIRY has been sent
      Bluetooth: hci_core: Fix hci_conn_hash_lookup_cis

Xiao Yao (1):
      Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE

Ying Hsu (1):
      Bluetooth: Fix deadlock in vhci_send_frame

 drivers/bluetooth/hci_vhci.c     | 10 ++++++----
 include/net/bluetooth/hci_core.h |  9 +++++++--
 net/bluetooth/af_bluetooth.c     |  7 ++++++-
 net/bluetooth/hci_event.c        | 30 +++++++++++++++++++++---------
 net/bluetooth/l2cap_core.c       | 21 +++++++++++++++------
 net/bluetooth/mgmt.c             | 25 ++++++++++++++++++-------
 net/bluetooth/smp.c              |  7 +++++++
 7 files changed, 80 insertions(+), 29 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ