Switch System Flaws: Difference between revisions
Line 519: | Line 519: | ||
! Public disclosure timeframe | ! Public disclosure timeframe | ||
! Discovered by | ! Discovered by | ||
|- | |||
| [[Bluetooth_Driver_services|Bluetooth]] A-63146698 | |||
| [https://android.googlesource.com/platform/system/bt/+/226ea26684d4cd609a5b456d3d2cc762453c2d75 A-63146698] / CVE-2017-0785. See also [https://info.armis.com/rs/645-PDC-047/images/BlueBorne%20Technical%20White%20Paper_20171130.pdf here]. | |||
| Bluetooth-sysmodule stack infoleak, which allows defeating ASLR (note: not tested on hw). | |||
| [[5.0.0]] | |||
| [[11.0.0]] | |||
| Switch: December 2020 | |||
| Switch: December 25, 2020 | |||
| Switch: [[User:Yellows8|yellows8]] | |||
|- | |||
| [[Bluetooth_Driver_services|Bluetooth]] sdp_server.cc process_service_search() continuation request p_req validation | |||
| With [5.0.0+], the following was added to the if-block prior to loading cont_offset from p_req: <code>(p_req + sizeof(cont_offset) > p_req_end)</code> (which verifies that cont_offset is within message bounds). | |||
| Bluetooth-sysmodule out-of-bounds read from heap, probably not useful since the read value must match a state field, etc. | |||
| [[5.0.0]] | |||
| [[11.0.0]] | |||
| Switch: December 2020 | |||
| Switch: December 25, 2020 | |||
| Switch: [[User:Yellows8|yellows8]] | |||
|- | |- | ||
| [[HID_services#hid:sys|hid:sys]] ButtonConfig s32 array-index not validated | | [[HID_services#hid:sys|hid:sys]] ButtonConfig s32 array-index not validated |