blob: a1f793bc3a97e93fde8f91e1f6c179183f05a6cb (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
|
Description: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack
References:
https://kb.cert.org/vuls/id/799380
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/
https://bugzilla.redhat.com/show_bug.cgi?id=1918601
https://bodhi.fedoraproject.org/updates/FEDORA-2021-a35b44fd9f
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
Notes:
bwh> Fedora claims this was fixed along with CVE-2020-26558 in
bwh> 5.12.7, which implies the upstream fix is commit 6d19628f539f
bwh> "Bluetooth: SMP: Fail if remote and local public keys are
bwh> identical". But it's not clear to me that that commit
bwh> addresses this issue too.
bwh> Intel claims to have addressed this for their Bluetooth
bwh> adapters in a firmware update.
Bugs:
upstream:
5.10-upstream-stable:
4.19-upstream-stable:
4.9-upstream-stable:
sid:
5.10-bullseye-security:
4.19-buster-security:
4.9-stretch-security:
|