Fix authentication bypass bug in SMP
It is possible for a malicious peer to bypass SMP authentication by claiming to have OOB data and proceeding with pairing, exploiting the fact that the Android stack sets the OOB randomizer to zero if no local OOB data is available. Drop the connection if a peer claims it has OOB data but no local OOB data has been stored. Bug: 251514171 Test: m com.android.btservices Ignore-AOSP-First: security Tag: #security (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:faea50382d2b1932abac40b76507d9bcd374635e) Merged-In: I85a121aea7b37318f8cfbcdb8075ece67806957e Change-Id: I85a121aea7b37318f8cfbcdb8075ece67806957e
Loading
Please register or sign in to comment