From: Wootak Jung Date: Tue, 28 Nov 2023 05:51:49 +0000 (+0900) Subject: Fix the security vulnerability issue X-Git-Tag: accepted/tizen/7.0/unified/20231212.053547~3 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=a1e210e40256d9994b854b536cef5a6633a4af9e;p=platform%2Fupstream%2Fbluez.git Fix the security vulnerability issue A variant of this attack works when bluetoothctl shows that bluetooth is discoverable, pariable, and discovering (only a subset may be necessary). On Ubuntu 22.04 Desktop this becomes true when the GNOME panel for bluetooth settings is opened. BlueZ's setting ClassicBondedOnly=true prevents this attack. This parameter is not enabled in CVE-2020-0556 patches and all distros I checked have not opted into this setting. Most members of the distros list are likely affected. Change-Id: Ib4883d1766d314bcd415308a9e4805e196462f3a Signed-off-by: Wootak Jung --- diff --git a/profiles/input/input.conf b/profiles/input/input.conf index 2c18fa1c..227b00af 100755 --- a/profiles/input/input.conf +++ b/profiles/input/input.conf @@ -18,7 +18,7 @@ # device connections. Several older mice have been known for not supporting # pairing/encryption. # Defaults to false to maximize device compatibility. -#ClassicBondedOnly=true +ClassicBondedOnly=true #ifndef TIZEN_FEATURE_BLUEZ_MODIFY # LE upgrade security