Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
work-around-Logitech-diNovo-Edge-keyboard-firmware-i.patch | [PATCH] work around Logitech diNovo Edge keyboard firmware issue https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/269851 |
Tommy <mesilliac@gmail.com> | no | 2013-01-10 | ||
allow-using-obexd-without-systemd-in-the-user-sessio.patch | [PATCH] Allow using obexd without systemd in the user session Not all sessions run systemd --user (actually, the majority doesn't), so the dbus daemon must be able to spawn obexd directly, and to do so it needs the full path of the daemon. |
Giovanni Campagna <gcampagna-cNUdlRotFMnNLxjTenLetw@public.gmane.org> | no | 2013-10-12 | ||
obex-Use-GLib-helper-function-to-manipulate-paths.patch | [PATCH 1/5] obex: Use GLib helper function to manipulate paths Instead of trying to do it by hand. This also makes sure that relative paths aren't used by the agent. |
Bastien Nocera <hadess@hadess.net> | no | 2013-11-09 | ||
agent-Assert-possible-infinite-loop.patch | [PATCH 4/5] agent: Assert possible infinite loop | Bastien Nocera <hadess@hadess.net> | no | 2013-12-09 | ||
bluetooth.conf.patch | Add permission to bluetooth control for user into bluetooth diff --git a/src/bluetooth.conf b/src/bluetooth.conf index 8a1e25801..d6e1c7a03 100644 |
Nobuhiro Iwamatsu <iwamatsu@debian.org> | not-needed | vendor | ||
main.conf.patch | diff --git a/src/main.conf b/src/main.conf index 2796f155e..490abef65 100644 |
no | ||||
change_path_of_hogsuspend.patch | Move path of hogsuspend to /run. diff --git a/profiles/input/suspend-dummy.c b/profiles/input/suspend-dummy.c index 542ae25..580213e 100644 |
Nobuhiro Iwamatsu <iwamatsu@debian.org> | not-needed | debian | vendor | |
org.bluez.obex.service.in.patch | not-needed | debian | 2017-03-17 | |||
Fix-typo.patch | [PATCH] Fix typo This commit fixes following typo: Refrence -> Reference Unkown -> Unknown disappered -> disappeared WRITTING -> WRITING fragement -> fragment specifiy -> specify errror -> error retreive -> retrieve Successfuly -> Successfully avaiable -> available bandwith -> bandwidth futher -> further occured -> occurred immediatelly -> immediately Seach -> Search Lenght -> Length miliseconds -> milliseconds missmatch -> mismatch UNKOWN -> UNKNOWN formely -> formerly Toogle -> Toggle Igoring -> Ignoring withouth -> without Succcess -> Success Unexpexted -> Unexpected Supressing -> Suppressing wich -> which |
Nobuhiro Iwamatsu <iwamatsu@debian.org> | no | 2022-11-18 | ||
shared-gatt-client-Fix-segfault-after-PIN-entry.patch | [PATCH] shared/gatt-client: Fix segfault after PIN entry (Closes: #884663) This fixes the problem of referring to NULL when ext_prop_read_cb() callback function is called with the value variable of read_cb not initialized. |
Nobuhiro Iwamatsu <iwamatsu@debian.org> | no | 2018-05-23 | ||
main.conf-Add-more-details-Closes-904212.patch | [PATCH] main.conf: Add more datails (Closes: #904212) | Nobuhiro Iwamatsu <iwamatsu@nigauri.org> | no | 2018-07-29 | ||
headers-use-releative-symlinks.patch | Use relative symlinks when linking to headers. Using the absolute build path only works during the build; the symlinks are included in the tarball, which results in broken symlinks in the tarball included in the bluez-source package. diff --git a/Makefile.am b/Makefile.am index 8bca5acfa..b2eafcb5f 100644 |
vagrant@reproducible-builds.org | no | 2021-07-23 | ||
Change-shebang-from-usr-bin-python-to-usr-bin-python.patch | [PATCH] Change shebang from /usr/bin/python to /usr/bin/python3 | Nobuhiro Iwamatsu <iwamatsu@debian.org> | no | 2021-07-28 | ||
input.conf-Change-default-of-ClassicBondedOnly.patch | input.conf: Change default of ClassicBondedOnly This changes the default of ClassicBondedOnly since defaulting to false is not inline with HID specification which mandates the of Security Mode 4: BLUETOOTH SPECIFICATION Page 84 of 123 Human Interface Device (HID) Profile: 5.4.3.4.2 Security Modes Bluetooth HID Hosts shall use Security Mode 4 when interoperating with Bluetooth HID devices that are compliant to the Bluetooth Core Specification v2.1+EDR[6]. |
Luiz Augusto von Dentz <luiz.von.dentz@intel.com> | no | debian | https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=25a471a83e02e1effb15d5a488b3f0085eaeb675 | 2023-10-10 |
CVE-2023-27349.patch | avrcp: Fix crash while handling unsupported events The following crash can be observed if the remote peer send and unsupported event: at pc 0x559644552088 bp 0x7ffe28b3c7b0 sp 0x7ffe28b3c7a0 WRITE of size 1 at 0x60b000148f11 thread T0 #0 0x559644552087 in avrcp_handle_event profiles/audio/avrcp.c:3907 #1 0x559644536c22 in control_response profiles/audio/avctp.c:939 #2 0x5596445379ab in session_cb profiles/audio/avctp.c:1108 #3 0x7fbcb3e51c43 in g_main_context_dispatch (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x55c43) #4 0x7fbcb3ea66c7 (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0xaa6c7) #5 0x7fbcb3e512b2 in g_main_loop_run (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x552b2) #6 0x559644754ab6 in mainloop_run src/shared/mainloop-glib.c:66 #7 0x559644755606 in mainloop_run_with_signal src/shared/mainloop-notify.c:188 #8 0x5596445bb963 in main src/main.c:1289 #9 0x7fbcb3bafd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #10 0x7fbcb3bafe3f in __libc_start_main_impl ../csu/libc-start.c:392 #11 0x5596444e8224 in _start (/usr/local/libexec/bluetooth/bluetoothd+0xf0224) |
Luiz Augusto von Dentz <luiz.von.dentz@intel.com> | no | 2023-03-22 | ||
CVE-2023-50229_CVE-2023-50230.patch | [PATCH] pbap: Fix not checking Primary/Secundary Counter length Primary/Secundary Counters are supposed to be 16 bytes values, if the server has implemented them incorrectly it may lead to the following crash: ================================================================= ==31860==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x607000001878 at pc 0x7f95a1575638 bp 0x7fff58c6bb80 sp 0x7fff58c6b328 READ of size 48 at 0x607000001878 thread T0 #0 0x7f95a1575637 in MemcmpInterceptorCommon(void*, int (*)(void const*, void const*, unsigned long), void const*, void const*, unsigned long) ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:860 #1 0x7f95a1575ba6 in __interceptor_memcmp ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:892 #2 0x7f95a1575ba6 in __interceptor_memcmp ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:887 #3 0x564df69c77a0 in read_version obexd/client/pbap.c:288 #4 0x564df69c77a0 in read_return_apparam obexd/client/pbap.c:352 #5 0x564df69c77a0 in phonebook_size_callback obexd/client/pbap.c:374 #6 0x564df69bea3c in session_terminate_transfer obexd/client/session.c:921 #7 0x564df69d56b0 in get_xfer_progress_first obexd/client/transfer.c:729 #8 0x564df698b9ee in handle_response gobex/gobex.c:1140 #9 0x564df698cdea in incoming_data gobex/gobex.c:1385 #10 0x7f95a12fdc43 in g_main_context_dispatch (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x55c43) #11 0x7f95a13526c7 (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0xaa6c7) #12 0x7f95a12fd2b2 in g_main_loop_run (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x552b2) #13 0x564df6977d41 in main obexd/src/main.c:307 #14 0x7f95a10a7d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #15 0x7f95a10a7e3f in __libc_start_main_impl ../csu/libc-start.c:392 #16 0x564df6978704 in _start (/usr/local/libexec/bluetooth/obexd+0x8b704) 0x607000001878 is located 0 bytes to the right of 72-byte region [0x607000001830,0x607000001878) allocated by thread T0 here: #0 0x7f95a1595a37 in __interceptor_calloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:154 #1 0x564df69c8b6a in pbap_probe obexd/client/pbap.c:1259 |
Luiz Augusto von Dentz <luiz.von.dentz@intel.com> | no | 2023-09-19 |