Bug 2253391 (CVE-2023-45866)
| Summary: | CVE-2023-45866 bluez: unauthorized HID device connections allows keystroke injection and arbitrary commands execution | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | TEJ RATHI <trathi> |
| Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A flaw was found in the HID Profile in BlueZ that opens doors for unauthorized connections, especially by devices like keyboards, to inject keystrokes without user confirmation. BlueZ lacks proper restrictions on non-bonded devices, creating a risk for attackers that are physically close to inject keystrokes and execute arbitrary commands when the device is in a discoverable state.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2253392 | ||
| Bug Blocks: | 2253393 | ||
|
Description
TEJ RATHI
2023-12-07 05:02:07 UTC
Created bluez tracking bugs for this issue: Affects: fedora-all [bug 2253392] This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:9413 https://access.redhat.com/errata/RHSA-2024:9413 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:11154 https://access.redhat.com/errata/RHSA-2024:11154 |