Commit: b9085d74f19f693a91db85f3ac4be271e02e97af
Parent: e63175ecf66f682721f2ba0337f65330aa798744
Author: Matias Karhumaa <matias.karhumaa@gmail.com>
Committer: Johan Hedberg <johan.hedberg@intel.com>
Date: 2018-10-18 19:10:26
Tree: eb6dd481c17dd119d13cecf78f12313fe6fb5591

btmon: fix segfault caused by buffer overflow Buffer overflow vulnerability in monitor/sdp.c SDP continuation handling caused btmon to crash. This happens in global static buffer which makes it non-trivial to exploit. This is nasty bug in a way that this can be triggered also over the air by sending malformed SDP Search Attribute request to device running btmon. This crash was foung by fuzzing btmon with AFL. Seems to be reproducible also with Synopsys Defensics SDP Server suite.

Diffstat

M monitor/sdp.c | 7 ++++++-

1 files changed, 6 insertions(+), 1 deletions(-)

View Full Diff | Patch