Bug 1918602 (CVE-2020-26558)
Summary: | CVE-2020-26558 bluez: Passkey Entry protocol of the Bluetooth Core is vulnerable to an impersonation attack | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | acaringi, adscvr, airlied, alciregi, allarkin, aquini, bhu, bmasney, bnocera, brdeoliv, bskeggs, chwhite, crwood, cye, cyin, darcari, dbohanno, debarbos, dhoward, dmarlin, dvlasenk, dwmw2, dzickus, ezulian, fhrbata, fpacheco, gtiwari, hdegoede, hkrzesin, hwkernel-mgr, jarod, jarodwilson, jdenham, jeremy, jfaracco, jforbes, jlelli, joe.lawrence, jonathan, josef, jshortt, jstancek, jwboyer, jwyatt, kcarcia, kernel-maint, ldoskova, lgoncalv, linville, lzampier, masami256, mchehab, mleitner, mmilgram, mstowell, nmurray, ptalbert, qzhao, rkeshri, rparrazo, rrobaina, rschiron, rvrbovsk, rysulliv, scweaver, security-response-team, spacewar, steved, sukulkar, tglozar, tyberry, walters, wcosta, williams, wmealing, ycote, ykopkova, zhijwang |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | bluez 5.57, bluez 5.58 | Doc Type: | If docs needed, set a value |
Doc Text: |
A vulnerability was found in the bluez, where Passkey Entry protocol used in Secure Simple Pairing (SSP), Secure Connections (SC) and LE Secure Connections (LESC) of the Bluetooth Core Specification is vulnerable to an impersonation attack where an active attacker can impersonate the initiating device without any previous knowledge.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-11-09 20:23:54 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1919285, 1919286, 1960000, 1960001, 1960003, 1964968, 1965051, 1965057, 1965058, 1966413, 1966414 | ||
Bug Blocks: | 1969593 |
Description
Dhananjay Arunesh
2021-01-21 08:03:05 UTC
Mitigation: Devices should not accept their own public key from a peer during a pairing session. The pairing procedure should be terminated with a failure status if this occurs. Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1964968] Created bluez tracking bugs for this issue: Affects: fedora-all [bug 1965051] This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:4432 https://access.redhat.com/errata/RHSA-2021:4432 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-26558 |