Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 610710 (CVE-2016-7837) - <net-wireless/bluez-5.42: Buffer overflow in parse_line function
Summary: <net-wireless/bluez-5.42: Buffer overflow in parse_line function
Status: RESOLVED INVALID
Alias: CVE-2016-7837
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: B2 [cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2017-02-23 16:20 UTC by Agostino Sarubbo
Modified: 2017-02-27 15:05 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2017-02-23 16:20:25 UTC
From ${URL} :

BlueZ provides a Bluetooth protocol stack for Linux kernel and userland utilities.
parse_line() function used in some userland utilities contains a buffer overflow vulnerability.

Upstream patch:

http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=8514068150759c1d6a46d4605d2351babfde1601


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Pacho Ramos gentoo-dev 2017-02-25 12:00:32 UTC
per https://bugzilla.redhat.com/show_bug.cgi?id=1425117 5.43 version shouldn't be affected
Comment 2 Thomas Deutschmann gentoo-dev 2017-02-27 15:05:50 UTC
git tag --contains 8514068150759c1d6a46d4605d2351babfde1601 | sort -u
5.42
5.43
5.44

>=v5.42 in repository since https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=4a287d008b4feb1268d81a6d8f94de05d225a61e

Repository is clean.

Closing as invalid because Gentoo is not affected by the reported vulnerability.