FS#70375 - [linux] Disable CONFIG_BT_HS to reduce attack surface of bluetooth stack

Attached to Project: Arch Linux
Opened by Manuel Reimer (M-Reimer) - Thursday, 08 April 2021, 19:27 GMT
Last edited by Jan Alexander Steffens (heftig) - Friday, 09 April 2021, 18:49 GMT
Task Type Bug Report
Category Kernel
Status Closed
Assigned To Jan Alexander Steffens (heftig)
Architecture All
Severity Medium
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 0
Private No

Details

Description:
Quote from this security report: https://google.github.io/security-research/pocs/linux/bleedingtooth/writeup.html
> I was happy that, as a result of this work, the decision was made to disable the Bluetooth High Speed feature by default in order to reduce the attack surface, which also meant the removal of the powerful heap primitive.

Which links this commit:
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/net/bluetooth?id=b176dd0ef6afcb3bca24f41d78b0d0b731ec2d08
> Bluetooth High Speed requires hardware support which is very uncommon nowadays since HS has not pickup interest by the industry.

This change (changed default) never landed on Arch as it is hard-coded to "yes" in the "config" file in the Arch PKGBUILD repo.

Given that this feature seems to be not needed ("has not pickup interest by the industry"), I think it would be a good idea to also disable it on the Arch default kernel.
This task depends upon

Closed by  Jan Alexander Steffens (heftig)
Friday, 09 April 2021, 18:49 GMT
Reason for closing:  Fixed
Additional comments about closing:  Fixed in trunk, pending next release.

Loading...