MGASA-2021-0281

Source
https://advisories.mageia.org/MGASA-2021-0281.html
Import Source
https://advisories.mageia.org/MGASA-2021-0281.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0281
Related
Published
2021-06-23T17:11:28Z
Modified
2021-06-23T15:27:23Z
Summary
Updated bluez packages fix security vulnerability
Details

Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time (CVE-2020-26558).

The clifeatread_cb() function in src/gatt-database.c does not perform bounds checks on the 'offset' variable before using it as an index into an array for reading (CVE-2021-3588).

References
Credits

Affected packages

Mageia:8 / bluez

Package

Name
bluez
Purl
pkg:rpm/mageia/bluez?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.55-3.1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / bluez

Package

Name
bluez
Purl
pkg:rpm/mageia/bluez?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.54-1.2.mga7

Ecosystem specific

{
    "section": "core"
}