Bug 1215239 (CVE-2020-26556)

Summary: VUL-0: CVE-2020-26556: bluez,kernel-source-azure,kernel-source,kernel-source-rt: Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device, able to conduct a successful brute-force attack on an insufficiently
Product: [Novell Products] SUSE Security Incidents Reporter: Marcus Meissner <meissner>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED WONTFIX QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: meissner, mhocko, security-team
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/377978/
See Also: https://bugzilla.suse.com/show_bug.cgi?id=1215242
https://bugzilla.suse.com/show_bug.cgi?id=1215554
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Marcus Meissner 2023-09-12 08:32:02 UTC
CVE-2020-26556

Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a
nearby device, able to conduct a successful brute-force attack on an
insufficiently random AuthValue before the provisioning procedure times out, to
complete authentication by leveraging Malleable Commitment.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-26556
Comment 1 Marcus Meissner 2023-09-12 08:50:00 UTC
Joey, could you state if our software is affected and all and which?
Comment 4 Joey Lee 2023-12-12 07:56:38 UTC
Sorry for my delay. 

I have read the IEEE paper "BlueMirror: Reflections on Bluetooth Pairing and Provisioning Protocols" and confirmed that this CVE-2020-26556 equals to CVE-2020-26559 (bsc#1215242). Both of them are the M-A3 attack in the paper.
Comment 5 Joey Lee 2023-12-12 08:17:27 UTC
After read the IEEE paper "BlueMirror: Reflections on Bluetooth Pairing and Provisioning Protocols" and "Mesh Profile Bluetooth ® Specification Revision: v1.0". I set this issue to WONFIX because the M-A3 attack is against Link Manager layer in chip. And the weakness is in crypto in the Provisioning protocol. 

Kernel is NOT aware the M-A3 attack in LM layer. So I didn't see any solution or workaround can be implemented in bluez.

For remission, the mesh service already be disabled by default because boo#1151518. And bluez package has a warning document :

/usr/share/doc/packages/bluez/README-mesh.SUSE

The bluetooth-mesh dbus system config has been disabled due to security
concerns. See https://bugzilla.opensuse.org/show_bug.cgi?id=1151518 for
details.

If you want to use this feature anyway, copy
bluetooth-mesh.conf to /etc/dbus-1/systemd.d/ and
org.bluez.mesh.service to /etc/dbus-1/system-services/,
then reboot.

If anyone has better idea, just reopen and put suggestion on bug.

Thanks!