- Feb 07, 2023
-
-
Hui Peng authored
-
Brian Delwiche authored
For NCIS certification, we need to drop the connection or reestablish encryption after receiving a command to disable link layer encryption on an encrypted link. However, dropping the connection for all devices breaks compatibility during role switch with devices running Bluetooth 2.1 or earlier, a category including many cars still in the field. Add a check forcing connections to drop in this case, conditioned on Common Criteria mode.. Bug: 251436534 Test: atest: bluetooth, lab validation forthcoming Tag: #security Ignore-AOSP-First: Security Change-Id: I94654ebeb16774643107ee41473725cfae3764ab
-
Hui Peng authored
-
Hui Peng authored
-
Hui Peng authored
-
Hui Peng authored
-
Hui Peng authored
Bug: 254445961 Test: manual Ignore-AOSP-First: security Change-Id: I1d3c208a5281b88ed25c0028f1a0000d6957637c
-
- Feb 06, 2023
-
-
Hui Peng authored
-
Hui Peng authored
-
Hui Peng authored
Bug: 245517503 Test: manual Ignore-AOSP-First: security Change-Id: If768b0b2e11bbc4444835fda28e246e285a7e8ab
-
Hui Peng authored
Bug: 251427561 Test: manual Ignore-AOSP-First: security Change-Id: I2db2339631d521515cb34536e358ae72ebeaaa8b
-
Hui Peng authored
Bug: 233879420 Test: manual Ignore-AOSP-First: security Change-Id: Ic740e5ff3ceabf3df1e78431f7d31adf356479f0
-
- Jan 31, 2023
-
-
Hui Peng authored
Bug: 236688764 Test: manul Ignore-AOSP-First: security Tag: #security Change-Id: I0ef4855e715be8fa9a69916e35d3a6c97498a9cc
-
- Jan 25, 2023
-
-
David Duarte authored
-
- Jan 14, 2023
-
-
Hui Peng authored
Bug: 245916076 Test: manual Ignore-AOSP-First: security Change-Id: I901d973a736678d7f3cc816ddf0cbbcbbd1fe93f
-
- Jan 12, 2023
-
-
Hui Peng authored
Bug: 263545186 Test: manual Ignore-AOSP-First: security Change-Id: I0abbb67842850cc2f1298b43dc49a89445b40a43
-
Brian Delwiche authored
-
- Jan 11, 2023
-
-
Hui Peng authored
-
Hui Peng authored
-
Hui Peng authored
Bug: 260569232 Test: manual, to add regression Tag: #security Ignore-AOSP-First: security Merged-In: I3d56c64f205c3675ba3856c1e553878b945ec261 Change-Id: I3d56c64f205c3675ba3856c1e553878b945ec261
-
Hui Peng authored
-
Hui Peng authored
Bug: 254774758 Ignore-AOSP-First: security Test: atest bluetooth_test_gd_unit Merged-In: I1709af943b6fa238dd4df41a62e6add36984c9ec Change-Id: I1709af943b6fa238dd4df41a62e6add36984c9ec
-
Hui Peng authored
-
Brian Delwiche authored
Several bounds checks in btif_rc.cc are not validated against AVRC_MAX_APP_ATTR_SIZE, leading to a potential buffer overflow when processing AVRCP responses exceeding that length. This is a patch from Qualcomm which has been adapted to T. Bug: 261468700 Test: atest bluetooth_test_gd_unit Tag: #security Ignore-AOSP-First: Security Change-Id: Ia71c9f22fa3eb0d2c2b50bf751a873a78919c38f
-
- Jan 10, 2023
-
-
Hui Peng authored
This CL also fix one of vendor specific event callbacks: BleAdvertiserVscHciInterfaceImpl::VendorSpecificEventCback. Other issues in the callbacks of this function are: - b/261857395, fix in I1ba4d1f1e62b1d77ac635cfb6b16cf175bfbf254. - b/264921486, fix in Ifed6a81c2a980394efbd5666305d10227d5ec186, Bug: 255304665 Test: manual Ignore-AOSP-First: security Tag: #security Change-Id: Ic9c43064db88a36aecb2a88f024db85f6cfc05f1
-
Hui Peng authored
-
Hui Peng authored
-
Hui Peng authored
-
Hui Peng authored
-
Hui Peng authored
-
Hui Peng authored
-
Hui Peng authored
-
Hui Peng authored
-
Hui Peng authored
-
Hui Peng authored
-
TreeHugger Robot authored
-
Hui Peng authored
-
Hui Peng authored
-
Hui Peng authored
If the length of the packet is less than 4 or the offset is 0 OOB access is triggered. Bug: 259939364 Test: manual Ignore-AOSP-First: security Merged-In: I11a3ebf20c45e9e69a4008a7d7271470e6235fe1 Change-Id: I11a3ebf20c45e9e69a4008a7d7271470e6235fe1
-