<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for bluez</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:2291-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-07-12T15:20:47Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-07-12T15:20:47Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-07-12T15:20:47Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for bluez</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for bluez fixes the following issues:

- CVE-2021-0129,CVE-2020-26558: Check bluetooth security flags (bsc#1186463).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-SLE-15.3-2021-2291</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGEHNTYN7DOZBN7IPNNCVSIU2JNPC226/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:2291-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1186463</URL>
      <Description>SUSE Bug 1186463</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-26558/</URL>
      <Description>SUSE CVE CVE-2020-26558 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-0129/</URL>
      <Description>SUSE CVE CVE-2021-0129 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.3">
      <Branch Type="Product Name" Name="openSUSE Leap 15.3">
        <FullProductName ProductID="openSUSE Leap 15.3" CPE="cpe:/o:opensuse:leap:15.3">openSUSE Leap 15.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="bluez-5.55-3.3.1">
      <FullProductName ProductID="bluez-5.55-3.3.1">bluez-5.55-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bluez-auto-enable-devices-5.55-3.3.1">
      <FullProductName ProductID="bluez-auto-enable-devices-5.55-3.3.1">bluez-auto-enable-devices-5.55-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bluez-cups-5.55-3.3.1">
      <FullProductName ProductID="bluez-cups-5.55-3.3.1">bluez-cups-5.55-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bluez-deprecated-5.55-3.3.1">
      <FullProductName ProductID="bluez-deprecated-5.55-3.3.1">bluez-deprecated-5.55-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bluez-devel-5.55-3.3.1">
      <FullProductName ProductID="bluez-devel-5.55-3.3.1">bluez-devel-5.55-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bluez-devel-32bit-5.55-3.3.1">
      <FullProductName ProductID="bluez-devel-32bit-5.55-3.3.1">bluez-devel-32bit-5.55-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="bluez-test-5.55-3.3.1">
      <FullProductName ProductID="bluez-test-5.55-3.3.1">bluez-test-5.55-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libbluetooth3-5.55-3.3.1">
      <FullProductName ProductID="libbluetooth3-5.55-3.3.1">libbluetooth3-5.55-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libbluetooth3-32bit-5.55-3.3.1">
      <FullProductName ProductID="libbluetooth3-32bit-5.55-3.3.1">libbluetooth3-32bit-5.55-3.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="bluez-5.55-3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:bluez-5.55-3.3.1">bluez-5.55-3.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="bluez-auto-enable-devices-5.55-3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:bluez-auto-enable-devices-5.55-3.3.1">bluez-auto-enable-devices-5.55-3.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="bluez-cups-5.55-3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:bluez-cups-5.55-3.3.1">bluez-cups-5.55-3.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="bluez-deprecated-5.55-3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1">bluez-deprecated-5.55-3.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="bluez-devel-5.55-3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:bluez-devel-5.55-3.3.1">bluez-devel-5.55-3.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="bluez-devel-32bit-5.55-3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:bluez-devel-32bit-5.55-3.3.1">bluez-devel-32bit-5.55-3.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="bluez-test-5.55-3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:bluez-test-5.55-3.3.1">bluez-test-5.55-3.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libbluetooth3-5.55-3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1">libbluetooth3-5.55-3.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libbluetooth3-32bit-5.55-3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:libbluetooth3-32bit-5.55-3.3.1">libbluetooth3-32bit-5.55-3.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.</Note>
    </Notes>
    <CVE>CVE-2020-26558</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:bluez-5.55-3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:bluez-auto-enable-devices-5.55-3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:bluez-cups-5.55-3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:bluez-devel-32bit-5.55-3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:bluez-devel-5.55-3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:bluez-test-5.55-3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libbluetooth3-32bit-5.55-3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGEHNTYN7DOZBN7IPNNCVSIU2JNPC226/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-26558.html</URL>
        <Description>CVE-2020-26558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179610</URL>
        <Description>SUSE Bug 1179610</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186463</URL>
        <Description>SUSE Bug 1186463</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.</Note>
    </Notes>
    <CVE>CVE-2021-0129</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:bluez-5.55-3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:bluez-auto-enable-devices-5.55-3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:bluez-cups-5.55-3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:bluez-deprecated-5.55-3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:bluez-devel-32bit-5.55-3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:bluez-devel-5.55-3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:bluez-test-5.55-3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libbluetooth3-32bit-5.55-3.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libbluetooth3-5.55-3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGEHNTYN7DOZBN7IPNNCVSIU2JNPC226/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-0129.html</URL>
        <Description>CVE-2021-0129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186463</URL>
        <Description>SUSE Bug 1186463</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
