CVE-2020-26558 log

Source
Severity Medium
Remote Yes
Type Private key recovery
Description
Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
Group Package Affected Fixed Severity Status Ticket
AVG-2050 bluez 5.56-2 5.57-1 Medium Fixed
AVG-2049 linux 5.12.6.arch1-1 5.12.7.arch1-1 Medium Fixed
References
https://bugzilla.redhat.com/show_bug.cgi?id=1918602
https://kb.cert.org/vuls/id/799380
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.7&id=58cca5ec43be72a1af95f11966381e9953b0c9f5
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.40&id=d8d261c7cfb3a5dd921b4aeeb944718afc3f3961
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=00da0fb4972cf59e1c075f313da81ea549cb8738