> On Jan 20, 2021, at 10:18 AM, Steve Sakoman <st...@sakoman.com> wrote:
> 
> On Sun, Jan 17, 2021 at 11:16 AM Robert Joslyn
> <robert.jos...@redrectangle.org> wrote:
>> 
>> According to the Intel security advisory [1], these CVEs are mitigated by
>> the following kernel commits:
>> 
>> eddb7732119d53400f48a02536a84c509692faa8 Bluetooth: A2MP: Fix not 
>> initializing all members
>> f19425641cb2572a33cb074d5e30283720bd4d22 Bluetooth: L2CAP: Fix calling 
>> sk_filter on non-socket based channel
>> b560a208cda0297fef6ff85bbfd58a8f0a52a543 Bluetooth: MGMT: Fix not checking 
>> if BT_HS is enabled
>> a2ec905d1e160a33b2e210e45ad30445ef26ce0e Bluetooth: fix kernel oops in 
>> store_pending_adv_report
>> 
>> The latest of these commits were backported from 5.10 to the stable kernel
>> tree in the 5.8.16 and 5.4.72 releases. Since the kernels provied by OE-core
>> contain these fixes, mark them as whitelisted.
> 
> This seems to be a good candidate for having the cpe database updated.
> Currently it is flagging all versions of bluez and Linux.
> 
> I sent a request to have the entry updated.  If they accept the
> request then we won't need this patch.  If they deny it we can merge
> the patch.

Sounds good, thanks!

Robert

> 
> Thanks for doing the research on this one!
> 
> Steve
> 
>> [1]: 
>> https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351
>> 
>> Signed-off-by: Robert Joslyn <robert.jos...@redrectangle.org>
>> ---
>> meta/recipes-connectivity/bluez5/bluez5_5.55.bb | 2 ++
>> 1 file changed, 2 insertions(+)
>> 
>> diff --git a/meta/recipes-connectivity/bluez5/bluez5_5.55.bb 
>> b/meta/recipes-connectivity/bluez5/bluez5_5.55.bb
>> index 8190924562..051fdef8ce 100644
>> --- a/meta/recipes-connectivity/bluez5/bluez5_5.55.bb
>> +++ b/meta/recipes-connectivity/bluez5/bluez5_5.55.bb
>> @@ -3,6 +3,8 @@ require bluez5.inc
>> SRC_URI[md5sum] = "94972b8bc7ade60c72b0ffa6ccff2c0a"
>> SRC_URI[sha256sum] = 
>> "8863717113c4897e2ad3271fc808ea245319e6fd95eed2e934fae8e0894e9b88"
>> 
>> +CVE_CHECK_WHITELIST += "CVE-2020-12351 CVE-2020-12352"
>> +
>> # noinst programs in Makefile.tools that are conditional on READLINE
>> # support
>> NOINST_TOOLS_READLINE ?= " \
>> --
>> 2.26.2
>> 
>> 
>> 
>> 
> 
> 

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#147046): 
https://lists.openembedded.org/g/openembedded-core/message/147046
Mute This Topic: https://lists.openembedded.org/mt/79760997/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to