lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20231222184625.2813676-1-luiz.dentz@gmail.com>
Date: Fri, 22 Dec 2023 13:46:24 -0500
From: Luiz Augusto von Dentz <luiz.dentz@...il.com>
To: davem@...emloft.net,
	kuba@...nel.org
Cc: linux-bluetooth@...r.kernel.org,
	netdev@...r.kernel.org
Subject: pull request: bluetooth-next 2023-12-22

The following changes since commit 27c346a22f816b1d02e9303c572b4b8e31b75f98:

  octeontx2-af: Fix a double free issue (2023-12-22 13:31:54 +0000)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git tags/for-net-next-2023-12-22

for you to fetch changes up to da9065caa594d19b26e1a030fd0cc27bd365d685:

  Bluetooth: Fix atomicity violation in {min,max}_key_size_set (2023-12-22 13:00:36 -0500)

----------------------------------------------------------------
bluetooth-next pull request for net-next:

 - btnxpuart: Fix recv_buf return value
 - L2CAP: Fix responding with multiple rejects
 - Fix atomicity violation in {min,max}_key_size_set
 - ISO: Allow binding a PA sync socket
 - ISO: Reassociate a socket with an active BIS
 - ISO: Avoid creating child socket if PA sync is terminating
 - Add device 13d3:3572 IMC Networks Bluetooth Radio
 - Don't suspend when there are connections
 - Remove le_restart_scan work
 - Fix bogus check for re-auth not supported with non-ssp
 - lib: Add documentation to exported functions
 - Support HFP offload for QCA2066

----------------------------------------------------------------
Francesco Dolcini (3):
      Bluetooth: btnxpuart: fix recv_buf() return value
      Bluetooth: btmtkuart: fix recv_buf() return value
      Bluetooth: btnxpuart: remove useless assignment

Frédéric Danis (1):
      Bluetooth: L2CAP: Fix possible multiple reject send

Gui-Dong Han (1):
      Bluetooth: Fix atomicity violation in {min,max}_key_size_set

Iulia Tanasescu (3):
      Bluetooth: ISO: Allow binding a PA sync socket
      Bluetooth: ISO: Reassociate a socket with an active BIS
      Bluetooth: ISO: Avoid creating child socket if PA sync is terminating

Jagan Teki (1):
      Bluetooth: Add device 13d3:3572 IMC Networks Bluetooth Radio

Kiran K (1):
      Bluetooth: btintel: Print firmware SHA1

Luiz Augusto von Dentz (3):
      Bluetooth: btusb: Don't suspend when there are connections
      Bluetooth: hci_core: Remove le_restart_scan work
      Bluetooth: Fix bogus check for re-auth no supported with non-ssp

Yuran Pereira (1):
      Bluetooth: Add documentation to exported functions in lib

Zijun Hu (3):
      Bluetooth: qca: Set both WIDEBAND_SPEECH and LE_STATES quirks for QCA2066
      Bluetooth: hci_conn: Check non NULL function before calling for HFP offload
      Bluetooth: qca: Support HFP offload for QCA2066

clancy shang (1):
      Bluetooth: hci_sync: fix BR/EDR wakeup bug

 drivers/bluetooth/btintel.c      |   5 +
 drivers/bluetooth/btintel.h      |   4 +-
 drivers/bluetooth/btmtkuart.c    |  11 +--
 drivers/bluetooth/btnxpuart.c    |   8 +-
 drivers/bluetooth/btusb.c        |   6 ++
 drivers/bluetooth/hci_qca.c      |  23 +++++
 include/net/bluetooth/hci_core.h |  26 +++++-
 net/bluetooth/hci_conn.c         |  51 ++++++++--
 net/bluetooth/hci_debugfs.c      |  12 ++-
 net/bluetooth/hci_event.c        |  11 +--
 net/bluetooth/hci_sync.c         | 106 +++------------------
 net/bluetooth/iso.c              | 197 +++++++++++++++++++++++++++++++++++++--
 net/bluetooth/l2cap_core.c       |   3 +-
 net/bluetooth/lib.c              |  69 +++++++++++++-
 net/bluetooth/mgmt.c             |  17 ----
 15 files changed, 386 insertions(+), 163 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ