diff --git a/bluetooth-Validate-socket-address-length-in-sco_sock.patch b/bluetooth-Validate-socket-address-length-in-sco_sock.patch new file mode 100644 index 0000000..1ee23fc --- /dev/null +++ b/bluetooth-Validate-socket-address-length-in-sco_sock.patch @@ -0,0 +1,27 @@ +From 5233252fce714053f0151680933571a2da9cbfb4 Mon Sep 17 00:00:00 2001 +From: "David S. Miller" +Date: Tue, 15 Dec 2015 15:39:08 -0500 +Subject: [PATCH] bluetooth: Validate socket address length in sco_sock_bind(). + +Signed-off-by: David S. Miller +--- + net/bluetooth/sco.c | 3 +++ + 1 file changed, 3 insertions(+) + +diff --git a/net/bluetooth/sco.c b/net/bluetooth/sco.c +index fe129663bd3f..f52bcbf2e58c 100644 +--- a/net/bluetooth/sco.c ++++ b/net/bluetooth/sco.c +@@ -526,6 +526,9 @@ static int sco_sock_bind(struct socket *sock, struct sockaddr *addr, + if (!addr || addr->sa_family != AF_BLUETOOTH) + return -EINVAL; + ++ if (addr_len < sizeof(struct sockaddr_sco)) ++ return -EINVAL; ++ + lock_sock(sk); + + if (sk->sk_state != BT_OPEN) { +-- +2.5.0 + diff --git a/kernel.spec b/kernel.spec index 403de69..bcfe4b0 100644 --- a/kernel.spec +++ b/kernel.spec @@ -662,6 +662,9 @@ Patch576: net-add-validation-for-the-socket-syscall-protocol-a.patch #CVE-2015-8569 rhbz 1292045 1292047 Patch600: pptp-verify-sockaddr_len-in-pptp_bind-and-pptp_conne.patch +#CVE-2015-8575 rhbz 1292840 1292841 +Patch601: bluetooth-Validate-socket-address-length-in-sco_sock.patch + # END OF PATCH DEFINITIONS %endif @@ -2106,6 +2109,9 @@ fi # # %changelog +* Fri Dec 18 2015 Josh Boyer +- CVE-2015-8575 information leak in sco_sock_bind (rhbz 1292840 1292841) + * Thu Dec 17 2015 Josh Boyer - CVE-2015-8569 info leak from getsockname (rhbz 1292045 1292047)