Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/814482/?format=api
{ "id": 814482, "url": "http://patchwork.ozlabs.org/api/patches/814482/?format=api", "web_url": "http://patchwork.ozlabs.org/project/buildroot/patch/20170916084117.11155-1-bernd.kuhls@t-online.de/", "project": { "id": 27, "url": "http://patchwork.ozlabs.org/api/projects/27/?format=api", "name": "Buildroot development", "link_name": "buildroot", "list_id": "buildroot.buildroot.org", "list_email": "buildroot@buildroot.org", "web_url": "", "scm_url": "", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20170916084117.11155-1-bernd.kuhls@t-online.de>", "list_archive_url": null, "date": "2017-09-16T08:41:17", "name": "[1/1] package/bluez5_utils: security bump version to 5.47", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": false, "hash": "de59bc3c113bfe77c11ad0c814cc9e53f2d59f8b", "submitter": { "id": 62613, "url": "http://patchwork.ozlabs.org/api/people/62613/?format=api", "name": "Bernd Kuhls", "email": "bernd.kuhls@t-online.de" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/buildroot/patch/20170916084117.11155-1-bernd.kuhls@t-online.de/mbox/", "series": [ { "id": 3425, "url": "http://patchwork.ozlabs.org/api/series/3425/?format=api", "web_url": "http://patchwork.ozlabs.org/project/buildroot/list/?series=3425", "date": "2017-09-16T08:41:17", "name": "[1/1] package/bluez5_utils: security bump version to 5.47", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/3425/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/814482/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/814482/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<buildroot-bounces@busybox.net>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "buildroot@lists.busybox.net" ], "Delivered-To": [ "patchwork-incoming@bilbo.ozlabs.org", "buildroot@osuosl.org" ], "Authentication-Results": "ozlabs.org;\n\tspf=pass (mailfrom) smtp.mailfrom=busybox.net\n\t(client-ip=140.211.166.137; helo=fraxinus.osuosl.org;\n\tenvelope-from=buildroot-bounces@busybox.net;\n\treceiver=<UNKNOWN>)", "Received": [ "from fraxinus.osuosl.org (smtp4.osuosl.org [140.211.166.137])\n\t(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))\n\t(No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xvQjP2f5Yz9sP1\n\tfor <incoming@patchwork.ozlabs.org>;\n\tSat, 16 Sep 2017 18:41:29 +1000 (AEST)", "from localhost (localhost [127.0.0.1])\n\tby fraxinus.osuosl.org (Postfix) with ESMTP id B4DBC89322;\n\tSat, 16 Sep 2017 08:41:24 +0000 (UTC)", "from fraxinus.osuosl.org ([127.0.0.1])\n\tby localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)\n\twith ESMTP id HWCcE0Uca-Wa; Sat, 16 Sep 2017 08:41:22 +0000 (UTC)", "from ash.osuosl.org (ash.osuosl.org [140.211.166.34])\n\tby fraxinus.osuosl.org (Postfix) with ESMTP id B084789517;\n\tSat, 16 Sep 2017 08:41:22 +0000 (UTC)", "from silver.osuosl.org (smtp3.osuosl.org [140.211.166.136])\n\tby ash.osuosl.org (Postfix) with ESMTP id C64941C11AD\n\tfor <buildroot@lists.busybox.net>;\n\tSat, 16 Sep 2017 08:41:21 +0000 (UTC)", "from localhost (localhost [127.0.0.1])\n\tby silver.osuosl.org (Postfix) with ESMTP id C0EF530582\n\tfor <buildroot@lists.busybox.net>;\n\tSat, 16 Sep 2017 08:41:21 +0000 (UTC)", "from silver.osuosl.org ([127.0.0.1])\n\tby localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)\n\twith ESMTP id NiGopt8ILNm6 for <buildroot@lists.busybox.net>;\n\tSat, 16 Sep 2017 08:41:20 +0000 (UTC)", "from mailout03.t-online.de (mailout03.t-online.de [194.25.134.81])\n\tby silver.osuosl.org (Postfix) with ESMTPS id C66F730524\n\tfor <buildroot@buildroot.org>; Sat, 16 Sep 2017 08:41:20 +0000 (UTC)", "from fwd21.aul.t-online.de (fwd21.aul.t-online.de [172.20.27.66])\n\tby mailout03.t-online.de (Postfix) with SMTP id 8EA564211EE6;\n\tSat, 16 Sep 2017 10:41:18 +0200 (CEST)", "from fli4l.lan.fli4l\n\t(S8SB2TZYwh9GvlKc9m+-C43ZODigp9DxnnC3E97Rmcs5wPt9+5MV8xhkUN+yEiog-O@[79.228.1.99])\n\tby fwd21.t-online.de with (TLSv1:ECDHE-RSA-AES256-SHA encrypted)\n\tesmtp id 1dt8f8-1cqp6W0; Sat, 16 Sep 2017 10:41:18 +0200", "from mahler.lan.fli4l ([192.168.1.1]:35410 helo=kuhls.lan.fli4l)\n\tby fli4l.lan.fli4l with esmtp (Exim 4.89)\n\t(envelope-from <bernd.kuhls@t-online.de>)\n\tid 1dt8f7-00036H-3K; Sat, 16 Sep 2017 10:41:17 +0200" ], "X-Virus-Scanned": [ "amavisd-new at osuosl.org", "amavisd-new at osuosl.org" ], "X-Greylist": "domain auto-whitelisted by SQLgrey-1.7.6", "From": "Bernd Kuhls <bernd.kuhls@t-online.de>", "To": "buildroot@buildroot.org", "Date": "Sat, 16 Sep 2017 10:41:17 +0200", "Message-Id": "<20170916084117.11155-1-bernd.kuhls@t-online.de>", "X-Mailer": "git-send-email 2.11.0", "X-ID": "S8SB2TZYwh9GvlKc9m+-C43ZODigp9DxnnC3E97Rmcs5wPt9+5MV8xhkUN+yEiog-O", "X-TOI-MSGID": "bcc9384d-99bb-4e65-a419-d44b2bf485b1", "Cc": "Marcin Bis <marcin@bis.org.pl>", "Subject": "[Buildroot] [PATCH 1/1] package/bluez5_utils: security bump version\n\tto 5.47", "X-BeenThere": "buildroot@busybox.net", "X-Mailman-Version": "2.1.18-1", "Precedence": "list", "List-Id": "Discussion and development of buildroot <buildroot.busybox.net>", "List-Unsubscribe": "<http://lists.busybox.net/mailman/options/buildroot>,\n\t<mailto:buildroot-request@busybox.net?subject=unsubscribe>", "List-Archive": "<http://lists.busybox.net/pipermail/buildroot/>", "List-Post": "<mailto:buildroot@busybox.net>", "List-Help": "<mailto:buildroot-request@busybox.net?subject=help>", "List-Subscribe": "<http://lists.busybox.net/mailman/listinfo/buildroot>,\n\t<mailto:buildroot-request@busybox.net?subject=subscribe>", "MIME-Version": "1.0", "Content-Type": "text/plain; charset=\"us-ascii\"", "Content-Transfer-Encoding": "7bit", "Errors-To": "buildroot-bounces@busybox.net", "Sender": "\"buildroot\" <buildroot-bounces@busybox.net>" }, "content": "Fixes CVE-2017-1000250 - All versions of the SDP server in BlueZ 5.46 and\nearlier are vulnerable to an information disclosure vulnerability which\nallows remote attackers to obtain sensitive information from the bluetoothd\nprocess memory. This vulnerability lies in the processing of SDP search\nattribute requests.\n\nSigned-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>\n---\n package/bluez5_utils/bluez5_utils.hash | 2 +-\n package/bluez5_utils/bluez5_utils.mk | 2 +-\n 2 files changed, 2 insertions(+), 2 deletions(-)", "diff": "diff --git a/package/bluez5_utils/bluez5_utils.hash b/package/bluez5_utils/bluez5_utils.hash\nindex bc20d220b8..36791c9e6f 100644\n--- a/package/bluez5_utils/bluez5_utils.hash\n+++ b/package/bluez5_utils/bluez5_utils.hash\n@@ -1,2 +1,2 @@\n # From https://www.kernel.org/pub/linux/bluetooth/sha256sums.asc:\n-sha256 ddab3d3837c1afb8ae228a94ba17709a4650bd4db24211b6771ab735c8908e28 bluez-5.46.tar.xz\n+sha256 cf75bf7cd5d564f21cc4a2bd01d5c39ce425397335fd47d9bbe43af0a58342c8 bluez-5.47.tar.xz\ndiff --git a/package/bluez5_utils/bluez5_utils.mk b/package/bluez5_utils/bluez5_utils.mk\nindex 13658cd050..1bc69691e4 100644\n--- a/package/bluez5_utils/bluez5_utils.mk\n+++ b/package/bluez5_utils/bluez5_utils.mk\n@@ -4,7 +4,7 @@\n #\n ################################################################################\n \n-BLUEZ5_UTILS_VERSION = 5.46\n+BLUEZ5_UTILS_VERSION = 5.47\n BLUEZ5_UTILS_SOURCE = bluez-$(BLUEZ5_UTILS_VERSION).tar.xz\n BLUEZ5_UTILS_SITE = $(BR2_KERNEL_MIRROR)/linux/bluetooth\n BLUEZ5_UTILS_INSTALL_STAGING = YES\n", "prefixes": [ "1/1" ] }