bluez4: add a patch to fix CVE-2017-1000250
[openembedded.git] / recipes / bluez / bluez4-4.99 / 0001-sdp-Fix-Out-of-bounds-heap-read-in-service_search_at.patch
1 From 9e009647b14e810e06626dde7f1bb9ea3c375d09 Mon Sep 17 00:00:00 2001
2 From: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
3 Date: Wed, 13 Sep 2017 10:01:40 +0300
4 Subject: [PATCH] sdp: Fix Out-of-bounds heap read in service_search_attr_req
5  function
6
7 Check if there is enough data to continue otherwise return an error.
8 ---
9  src/sdpd-request.c | 2 +-
10  1 file changed, 1 insertion(+), 1 deletion(-)
11
12 diff --git a/src/sdpd-request.c b/src/sdpd-request.c
13 index 1eefdce..318d044 100644
14 --- a/src/sdpd-request.c
15 +++ b/src/sdpd-request.c
16 @@ -917,7 +917,7 @@ static int service_search_attr_req(sdp_req_t *req, sdp_buf_t *buf)
17         } else {
18                 /* continuation State exists -> get from cache */
19                 sdp_buf_t *pCache = sdp_get_cached_rsp(cstate);
20 -               if (pCache) {
21 +               if (pCache && cstate->cStateValue.maxBytesSent < pCache->data_size) {
22                         uint16_t sent = MIN(max, pCache->data_size - cstate->cStateValue.maxBytesSent);
23                         pResponse = pCache->data;
24                         memcpy(buf->data, pResponse + cstate->cStateValue.maxBytesSent, sent);
25 -- 
26 2.7.4
27