Bug 21698 - bluez new security issue CVE-2017-1000250
Summary: bluez new security issue CVE-2017-1000250
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 6
Hardware: All Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA5TOO MGA5-64-OK MGA6-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2017-09-12 19:22 CEST by David Walser
Modified: 2018-11-03 21:22 CET (History)
6 users (show)

See Also:
Source RPM: bluez-5.45-2.mga6.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2017-09-12 19:22:33 CEST
Bluetooth security issues have been disclosed in the press today (September 12):
http://www.eweek.com/security/bluetooth-blueborne-flaws-expose-billions-of-devices-to-security-risks

bluez is affected (including Mageia 5 and Mageia 6), and the kernel is affected as well (CVE-2017-1000251).
Comment 1 David Walser 2017-09-12 19:28:03 CEST
RedHat has issued an advisory and additional information for the kernel:
https://access.redhat.com/errata/RHSA-2017:2681
https://access.redhat.com/security/vulnerabilities/blueborne

Nobody has issued an advisory for bluez yet, but Fedora has checked a patch into SVN:
http://pkgs.fedoraproject.org/cgit/rpms/bluez.git/commit/?id=268965a3ff29e5a92a60d2dcf398d9b20a551240

CC: (none) => tmb
Whiteboard: (none) => MGA6TOO, MGA5TOO

Comment 2 David Walser 2017-09-12 19:28:29 CEST
RedHat bug for bluez:
https://bugzilla.redhat.com/show_bug.cgi?id=1489446

Severity: normal => major

Comment 3 David Walser 2017-09-12 23:32:46 CEST
RedHat has issued an advisory for bluez:
https://access.redhat.com/errata/RHSA-2017:2685

So has Ubuntu:
https://usn.ubuntu.com/usn/usn-3413-1/
Comment 4 Thomas Backlund 2017-09-13 08:12:48 CEST
kernel fixes is coming in upstream  stable trees currently being validated... for mga5: 4.4.88, mga6: 4.9.50, cauldron: 4.12.13 

So I'll release them all tomorrow for QA
Comment 5 Marja Van Waes 2017-09-13 11:54:10 CEST
(In reply to Thomas Backlund from comment #4)
> kernel fixes is coming in upstream  stable trees currently being
> validated... for mga5: 4.4.88, mga6: 4.9.50, cauldron: 4.12.13 
> 
> So I'll release them all tomorrow for QA

So the issue only remains for bluez.

Assigning to the registered bluez maintainer.

Assignee: bugsquad => shlomif
CC: (none) => marja11

Comment 6 David Walser 2017-09-14 11:51:51 CEST
Full details of these issues:
http://openwall.com/lists/oss-security/2017/09/13/4
Comment 7 Shlomi Fish 2017-09-14 12:54:15 CEST
Submitted updates to Cauldron/mga6/mga5. Note that the mga6 update was accidently submittd to tainted/updates_testing.

Whiteboard: MGA6TOO, MGA5TOO => MGA5TOO
Version: Cauldron => 6

Comment 8 David Walser 2017-09-14 13:28:55 CEST
Fedora has issued an advisory for this on September 13:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/AWVMZIXGZ564SXHHRWGEALD7LRSJGI5Q/
Comment 9 Thomas Backlund 2017-09-14 13:38:12 CEST
(In reply to Shlomi Fish from comment #7)
> Submitted updates to Cauldron/mga6/mga5. Note that the mga6 update was
> accidently submittd to tainted/updates_testing.


Then you must re-submit to core/updates_testing.
Comment 10 Shlomi Fish 2017-09-14 14:12:50 CEST
(In reply to Thomas Backlund from comment #9)
> (In reply to Shlomi Fish from comment #7)
> > Submitted updates to Cauldron/mga6/mga5. Note that the mga6 update was
> > accidently submittd to tainted/updates_testing.
> 
> 
> Then you must re-submit to core/updates_testing.

done - thanks!
Comment 11 David Walser 2017-09-14 15:09:52 CEST
Thanks Shlomi!

Advisory:
========================

Updated bluez packages fixes security vulnerability:

An information-disclosure flaw was found in the bluetoothd implementation of the
Service Discovery Protocol (SDP). A specially crafted Bluetooth device could,
without prior pairing or user interaction, retrieve portions of the bluetoothd
process memory, including potentially sensitive information such as Bluetooth
encryption keys (CVE-2017-1000250).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000250
https://access.redhat.com/security/vulnerabilities/blueborne
https://access.redhat.com/errata/RHSA-2017:2685
========================

Updated packages in core/updates_testing:
========================
bluez-5.28-1.1.mga5
bluez-cups-5.28-1.1.mga5
bluez-hid2hci-5.28-1.1.mga5
libbluez3-5.28-1.1.mga5
libbluez-devel-5.28-1.1.mga5
bluez-5.45-2.1.mga6
bluez-cups-5.45-2.1.mga6
bluez-hid2hci-5.45-2.1.mga6
libbluez3-5.45-2.1.mga6
libbluez-devel-5.45-2.1.mga6

from SRPMS:
bluez-5.28-1.1.mga5.src.rpm
bluez-5.45-2.1.mga6.src.rpm

CC: (none) => shlomif
Assignee: shlomif => qa-bugs

Comment 12 Len Lawrence 2017-09-14 20:21:06 CEST
mga5  x86_64

Installed the updates from Updates Testing.  Ran blueman-assistant to discover the USB bluetooth adapter and paired a Bose Mini Soundlink then configured sound via pavucontrol.  Played "Let The Bright Seraphim" using mplayer.

$ bluetoothctl
[NEW] Controller <MAC address> vega [default]
[NEW] Device 00:0C:8A:9D:21:C3 Bose Mini SoundLink
[bluetooth]# version
Version 5.28
[bluetooth]# info 00:0C:8A:9D:21:C3
Device 00:0C:8A:9D:21:C3
	Name: Bose Mini SoundLink
	Alias: Bose Mini SoundLink
	Class: 0x240428
	Icon: audio-card
	Paired: yes
	Trusted: yes
	Blocked: no
	Connected: yes
	LegacyPairing: no
	UUID: Audio Sink                (0000110b-0000-1000-8000-00805f9b34fb)
	UUID: A/V Remote Control Target (0000110c-0000-1000-8000-00805f9b34fb)
	UUID: Advanced Audio Distribu.. (0000110d-0000-1000-8000-00805f9b34fb)
	UUID: A/V Remote Control        (0000110e-0000-1000-8000-00805f9b34fb)

Good enough.

CC: (none) => tarazed25

Len Lawrence 2017-09-14 20:21:57 CEST

Whiteboard: MGA5TOO => MGA5TOO MGA5-64-OK

Comment 13 Len Lawrence 2017-09-14 23:07:05 CEST
mga6  x86_64

rfkill is useful for checking the status of wireless devices.
$ rfkill list
0: phy0: Wireless LAN
	Soft blocked: no
	Hard blocked: no
1: hci0: Bluetooth
	Soft blocked: no
	Hard blocked: no

Installed the bluetooth packages from Updates Testing.
Ran bluetoothctl in a terminal to check what was happening under the hood.
Invoked blueman-assistant to search for devices in range of the BT USB adapter.
It found the HP Officejet 100 printer and the Samsung TV in the other room, the Mini Soundlink and the Damson Cisor.  Paired with the Mini Soundlink and played an organ concerto.  Switched off the Mini Soundlink and paired with the Damson Cisor and played more music.

Had a go at connecting the printer; it paired OK with the passcode of 000000, but no contact.
At least it was detected and the identification string returned.  More experimentation needed.

The basics are there so it gets an OK.
Len Lawrence 2017-09-14 23:07:20 CEST

Whiteboard: MGA5TOO MGA5-64-OK => MGA5TOO MGA5-64-OK MGA6-64-OK

Comment 14 Len Lawrence 2017-09-14 23:31:44 CEST
mga6  x86_64

A little more digging behind the scenes.
The hci utilities are installed and l2ping but I am unsure of bluetoothd.  It does not seem to run as a service.  Just checked services and found bluetooth running;
$ systemctl status bluetooth
● bluetooth.service - Bluetooth service
   Loaded: loaded (/usr/lib/systemd/system/bluetooth.service; enabled; vendor pr
   Active: active (running) since Thu 2017-09-14 21:05:11 BST; 1h 19min ago
     Docs: man:bluetoothd(8)
 Main PID: 21079 (bluetoothd)
   Status: "Running"
   CGroup: /system.slice/bluetooth.service
           └─21079 /usr/libexec/bluetooth/bluetoothd

$ urpmq --whatrequires bluez | sort -u
anyremote
bluedevil
blueman
bluez
connman
ganyremote
gnome-bluetooth
gnome-user-share
lib64qt5bluetooth5
libqt5bluetooth5
networkmanager-bluetooth
perl-Net-Bluetooth

If you are using Plasma bluedevil is the native manager.  Run bluedevil-wizard from the commandline.  Invoking bluedevil from the menu places a bt icon in the panel IIRC.  That gives you access to management functions.
Comment 15 Lewis Smith 2017-09-17 20:06:36 CEST
Thanks Len for both release tests, 64-bit. Warrants pushing. Advisoried.

Keywords: (none) => advisory, validated_update
CC: (none) => lewyssmith, sysadmin-bugs

Comment 16 Mageia Robot 2017-09-21 15:44:26 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2017-0350.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

Comment 17 Frédéric "LpSolit" Buclin 2018-11-03 21:22:53 CET
(In reply to Shlomi Fish from comment #7)
> Submitted updates to Cauldron/mga6/mga5. Note that the mga6 update was
> accidently submittd to tainted/updates_testing.

@sysadmins: could this package be removed from tainted/updates_testing, please? It's there for more than a year.

Note You need to log in before you can comment on or make changes to this bug.