Debian Patches

Status for bluez/5.66-1+deb12u2

Patch Description Author Forwarded Bugs Origin Last update
work-around-Logitech-diNovo-Edge-keyboard-firmware-i.patch [PATCH] work around Logitech diNovo Edge keyboard firmware issue
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/269851
Tommy <mesilliac@gmail.com> no 2013-01-10
allow-using-obexd-without-systemd-in-the-user-sessio.patch [PATCH] Allow using obexd without systemd in the user session
Not all sessions run systemd --user (actually, the majority
doesn't), so the dbus daemon must be able to spawn obexd
directly, and to do so it needs the full path of the daemon.
Giovanni Campagna <gcampagna-cNUdlRotFMnNLxjTenLetw@public.gmane.org> no 2013-10-12
obex-Use-GLib-helper-function-to-manipulate-paths.patch [PATCH 1/5] obex: Use GLib helper function to manipulate paths
Instead of trying to do it by hand. This also makes sure that
relative paths aren't used by the agent.
Bastien Nocera <hadess@hadess.net> no 2013-11-09
agent-Assert-possible-infinite-loop.patch [PATCH 4/5] agent: Assert possible infinite loop Bastien Nocera <hadess@hadess.net> no 2013-12-09
bluetooth.conf.patch Add permission to bluetooth control for user into bluetooth
diff --git a/src/bluetooth.conf b/src/bluetooth.conf
index 8a1e25801..d6e1c7a03 100644
Nobuhiro Iwamatsu <iwamatsu@debian.org> not-needed vendor
main.conf.patch diff --git a/src/main.conf b/src/main.conf
index 2796f155e..490abef65 100644
no
change_path_of_hogsuspend.patch Move path of hogsuspend to /run.
diff --git a/profiles/input/suspend-dummy.c b/profiles/input/suspend-dummy.c
index 542ae25..580213e 100644
Nobuhiro Iwamatsu <iwamatsu@debian.org> not-needed debian vendor
org.bluez.obex.service.in.patch not-needed debian 2017-03-17
Fix-typo.patch [PATCH] Fix typo
This commit fixes following typo:

Refrence -> Reference
Unkown -> Unknown
disappered -> disappeared
WRITTING -> WRITING
fragement -> fragment
specifiy -> specify
errror -> error
retreive -> retrieve
Successfuly -> Successfully
avaiable -> available
bandwith -> bandwidth
futher -> further
occured -> occurred
immediatelly -> immediately
Seach -> Search
Lenght -> Length
miliseconds -> milliseconds
missmatch -> mismatch
UNKOWN -> UNKNOWN
formely -> formerly
Toogle -> Toggle
Igoring -> Ignoring
withouth -> without
Succcess -> Success
Unexpexted -> Unexpected
Supressing -> Suppressing
wich -> which
Nobuhiro Iwamatsu <iwamatsu@debian.org> no 2022-11-18
shared-gatt-client-Fix-segfault-after-PIN-entry.patch [PATCH] shared/gatt-client: Fix segfault after PIN entry (Closes: #884663)
This fixes the problem of referring to NULL when ext_prop_read_cb() callback
function is called with the value variable of read_cb not initialized.
Nobuhiro Iwamatsu <iwamatsu@debian.org> no 2018-05-23
main.conf-Add-more-details-Closes-904212.patch [PATCH] main.conf: Add more datails (Closes: #904212) Nobuhiro Iwamatsu <iwamatsu@nigauri.org> no 2018-07-29
headers-use-releative-symlinks.patch Use relative symlinks when linking to headers.
Using the absolute build path only works during the build; the
symlinks are included in the tarball, which results in broken symlinks
in the tarball included in the bluez-source package.

diff --git a/Makefile.am b/Makefile.am
index 8bca5acfa..b2eafcb5f 100644
vagrant@reproducible-builds.org no 2021-07-23
Change-shebang-from-usr-bin-python-to-usr-bin-python.patch [PATCH] Change shebang from /usr/bin/python to /usr/bin/python3 Nobuhiro Iwamatsu <iwamatsu@debian.org> no 2021-07-28
input.conf-Change-default-of-ClassicBondedOnly.patch input.conf: Change default of ClassicBondedOnly
This changes the default of ClassicBondedOnly since defaulting to false
is not inline with HID specification which mandates the of Security Mode
4:

BLUETOOTH SPECIFICATION Page 84 of 123
Human Interface Device (HID) Profile:

5.4.3.4.2 Security Modes
Bluetooth HID Hosts shall use Security Mode 4 when interoperating with
Bluetooth HID devices that are compliant to the Bluetooth Core
Specification v2.1+EDR[6].
Luiz Augusto von Dentz <luiz.von.dentz@intel.com> no debian https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=25a471a83e02e1effb15d5a488b3f0085eaeb675 2023-10-10
CVE-2023-27349.patch avrcp: Fix crash while handling unsupported events
The following crash can be observed if the remote peer send and
unsupported event:

at pc 0x559644552088 bp 0x7ffe28b3c7b0 sp 0x7ffe28b3c7a0
WRITE of size 1 at 0x60b000148f11 thread T0
#0 0x559644552087 in avrcp_handle_event profiles/audio/avrcp.c:3907
#1 0x559644536c22 in control_response profiles/audio/avctp.c:939
#2 0x5596445379ab in session_cb profiles/audio/avctp.c:1108
#3 0x7fbcb3e51c43 in g_main_context_dispatch (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x55c43)
#4 0x7fbcb3ea66c7 (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0xaa6c7)
#5 0x7fbcb3e512b2 in g_main_loop_run (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x552b2)
#6 0x559644754ab6 in mainloop_run src/shared/mainloop-glib.c:66
#7 0x559644755606 in mainloop_run_with_signal src/shared/mainloop-notify.c:188
#8 0x5596445bb963 in main src/main.c:1289
#9 0x7fbcb3bafd8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#10 0x7fbcb3bafe3f in __libc_start_main_impl ../csu/libc-start.c:392
#11 0x5596444e8224 in _start (/usr/local/libexec/bluetooth/bluetoothd+0xf0224)
Luiz Augusto von Dentz <luiz.von.dentz@intel.com> no 2023-03-22
CVE-2023-50229_CVE-2023-50230.patch [PATCH] pbap: Fix not checking Primary/Secundary Counter length
Primary/Secundary Counters are supposed to be 16 bytes values, if the
server has implemented them incorrectly it may lead to the following
crash:

=================================================================
==31860==ERROR: AddressSanitizer: heap-buffer-overflow on address
0x607000001878 at pc 0x7f95a1575638 bp 0x7fff58c6bb80 sp 0x7fff58c6b328

READ of size 48 at 0x607000001878 thread T0
#0 0x7f95a1575637 in MemcmpInterceptorCommon(void*, int (*)(void const*, void const*, unsigned long), void const*, void const*, unsigned long) ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:860
#1 0x7f95a1575ba6 in __interceptor_memcmp ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:892
#2 0x7f95a1575ba6 in __interceptor_memcmp ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:887
#3 0x564df69c77a0 in read_version obexd/client/pbap.c:288
#4 0x564df69c77a0 in read_return_apparam obexd/client/pbap.c:352
#5 0x564df69c77a0 in phonebook_size_callback obexd/client/pbap.c:374
#6 0x564df69bea3c in session_terminate_transfer obexd/client/session.c:921
#7 0x564df69d56b0 in get_xfer_progress_first obexd/client/transfer.c:729
#8 0x564df698b9ee in handle_response gobex/gobex.c:1140
#9 0x564df698cdea in incoming_data gobex/gobex.c:1385
#10 0x7f95a12fdc43 in g_main_context_dispatch (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x55c43)
#11 0x7f95a13526c7 (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0xaa6c7)
#12 0x7f95a12fd2b2 in g_main_loop_run (/lib/x86_64-linux-gnu/libglib-2.0.so.0+0x552b2)
#13 0x564df6977d41 in main obexd/src/main.c:307
#14 0x7f95a10a7d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
#15 0x7f95a10a7e3f in __libc_start_main_impl ../csu/libc-start.c:392
#16 0x564df6978704 in _start (/usr/local/libexec/bluetooth/obexd+0x8b704)
0x607000001878 is located 0 bytes to the right of 72-byte region [0x607000001830,0x607000001878)

allocated by thread T0 here:
#0 0x7f95a1595a37 in __interceptor_calloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:154
#1 0x564df69c8b6a in pbap_probe obexd/client/pbap.c:1259
Luiz Augusto von Dentz <luiz.von.dentz@intel.com> no 2023-09-19

All known versions for source package 'bluez'

Links