]> code.ossystems Code Review - openembedded-core.git/commit
bluez: fix CVE-2020-0556
authorAnuj Mittal <anuj.mittal@intel.com>
Fri, 13 Mar 2020 01:09:38 +0000 (09:09 +0800)
committerAnuj Mittal <anuj.mittal@intel.com>
Mon, 16 Mar 2020 07:49:02 +0000 (15:49 +0800)
commitc940e4b858d6be28b198770768117ecc098fa0d3
tree74bc3323cdcb07338adbe862131eec56b1dcbf92
parent878817358eb7c25ffa48d10dde9475299674a96c
bluez: fix CVE-2020-0556

It was discovered that BlueZ's HID and HOGP profiles implementations
don't specifically require bonding between the device and the host.

This creates an opportunity for an malicious device to connect to a
target host to either impersonate an existing HID device without
security or to cause an SDP or GATT service discovery to take place
which would allow HID reports to be injected to the input subsystem from
a non-bonded source.

(From OE-Core rev: d598f8eee0741148416e8660e10c716654205cb5)

Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit bed169a07b04a7dc003958fa309e6ff761f85a72)
meta/recipes-connectivity/bluez5/bluez5.inc
meta/recipes-connectivity/bluez5/bluez5/CVE-2020-0556-1.patch [new file with mode: 0644]
meta/recipes-connectivity/bluez5/bluez5/CVE-2020-0556-2.patch [new file with mode: 0644]