summaryrefslogtreecommitdiffstats
path: root/meta/recipes-connectivity/bluez5/bluez5
diff options
context:
space:
mode:
authorArchana Polampalli <archana.polampalli@windriver.com>2023-12-08 11:44:15 +0000
committerRichard Purdie <richard.purdie@linuxfoundation.org>2023-12-09 19:17:11 +0000
commitdb73316fea6b4791cdd7064c7b0ccc5b777212ca (patch)
treec04869841cf8abc5876f31e6aa9e8a047f31bb32 /meta/recipes-connectivity/bluez5/bluez5
parent0b4a4952e145dd9cfd77724731c600f2af28987f (diff)
downloadpoky-db73316fea6b4791cdd7064c7b0ccc5b777212ca.tar.gz
bluez5: fix CVE-2023-45866
Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports,potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access. An example affected package is bluez 5.64-0ubuntu1 in Ubuntu 22.04LTS. NOTE: in some cases, a CVE-2020-0556 mitigation would have already addressed this Bluetooth HID Hosts issue. References: https://nvd.nist.gov/vuln/detail/CVE-2023-45866 Upstream patches: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/profiles/input?id=25a471a83e02e1effb15d5a488b3f0085eaeb675 (From OE-Core rev: ef93aa6a815f2732dadf14e2d7e62c15c46b6007) Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-connectivity/bluez5/bluez5')
-rw-r--r--meta/recipes-connectivity/bluez5/bluez5/CVE-2023-45866.patch56
1 files changed, 56 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/bluez5/bluez5/CVE-2023-45866.patch b/meta/recipes-connectivity/bluez5/bluez5/CVE-2023-45866.patch
new file mode 100644
index 0000000000..5bb31d866a
--- /dev/null
+++ b/meta/recipes-connectivity/bluez5/bluez5/CVE-2023-45866.patch
@@ -0,0 +1,56 @@
1From 25a471a83e02e1effb15d5a488b3f0085eaeb675 Mon Sep 17 00:00:00 2001
2From: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
3Date: Tue, 10 Oct 2023 13:03:12 -0700
4Subject: [PATCH] input.conf: Change default of ClassicBondedOnly
5
6This changes the default of ClassicBondedOnly since defaulting to false
7is not inline with HID specification which mandates the of Security Mode
84:
9
10BLUETOOTH SPECIFICATION Page 84 of 123
11Human Interface Device (HID) Profile:
12
13 5.4.3.4.2 Security Modes
14 Bluetooth HID Hosts shall use Security Mode 4 when interoperating with
15 Bluetooth HID devices that are compliant to the Bluetooth Core
16 Specification v2.1+EDR[6].
17
18Upstream-Status: Backport
19[https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/profiles/input?id=25a471a83e02e1effb15d5a488b3f0085eaeb675]
20
21CVE: CVE-2023-45866
22
23Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
24---
25 profiles/input/device.c | 2 +-
26 profiles/input/input.conf | 2 +-
27 2 files changed, 2 insertions(+), 2 deletions(-)
28
29diff --git a/profiles/input/device.c b/profiles/input/device.c
30index 4a50ea9..4310dd1 100644
31--- a/profiles/input/device.c
32+++ b/profiles/input/device.c
33@@ -81,7 +81,7 @@ struct input_device {
34
35 static int idle_timeout = 0;
36 static bool uhid_enabled = false;
37-static bool classic_bonded_only = false;
38+static bool classic_bonded_only = true;
39
40 void input_set_idle_timeout(int timeout)
41 {
42diff --git a/profiles/input/input.conf b/profiles/input/input.conf
43index 4c70bc5..d8645f3 100644
44--- a/profiles/input/input.conf
45+++ b/profiles/input/input.conf
46@@ -17,7 +17,7 @@
47 # platforms may want to make sure that input connections only come from bonded
48 # device connections. Several older mice have been known for not supporting
49 # pairing/encryption.
50-# Defaults to false to maximize device compatibility.
51+# Defaults to true for security.
52 #ClassicBondedOnly=true
53
54 # LE upgrade security
55--
562.40.0