package/bluez5_utils: security bump version to 5.47
authorBernd Kuhls <bernd.kuhls@t-online.de>
Sat, 16 Sep 2017 08:41:17 +0000 (10:41 +0200)
committerThomas Petazzoni <thomas.petazzoni@free-electrons.com>
Sun, 17 Sep 2017 16:52:22 +0000 (18:52 +0200)
Fixes CVE-2017-1000250 - All versions of the SDP server in BlueZ 5.46 and
earlier are vulnerable to an information disclosure vulnerability which
allows remote attackers to obtain sensitive information from the bluetoothd
process memory.  This vulnerability lies in the processing of SDP search
attribute requests.

Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
package/bluez5_utils/bluez5_utils.hash
package/bluez5_utils/bluez5_utils.mk

index bc20d220b8130a2a6e2e83b3dc558c8e5bd88f7d..36791c9e6f1fb752c7081e0e6bfb2d3ea45d6ebf 100644 (file)
@@ -1,2 +1,2 @@
 # From https://www.kernel.org/pub/linux/bluetooth/sha256sums.asc:
-sha256 ddab3d3837c1afb8ae228a94ba17709a4650bd4db24211b6771ab735c8908e28  bluez-5.46.tar.xz
+sha256 cf75bf7cd5d564f21cc4a2bd01d5c39ce425397335fd47d9bbe43af0a58342c8  bluez-5.47.tar.xz
index 13658cd0508f6069bc46efaacab95685d1a387c1..1bc69691e46e3ab4104347c1b3a39035de60d653 100644 (file)
@@ -4,7 +4,7 @@
 #
 ################################################################################
 
-BLUEZ5_UTILS_VERSION = 5.46
+BLUEZ5_UTILS_VERSION = 5.47
 BLUEZ5_UTILS_SOURCE = bluez-$(BLUEZ5_UTILS_VERSION).tar.xz
 BLUEZ5_UTILS_SITE = $(BR2_KERNEL_MIRROR)/linux/bluetooth
 BLUEZ5_UTILS_INSTALL_STAGING = YES