Google security researchers are warning of a new set of zero-click vulnerabilities in the Linux Bluetooth software stack that can allow a nearby unauthenticated, remote attacker to execute arbitrary code with kernel privileges on vulnerable devices. According to security engineer Andy Nguyen, the three flaws — collectively called BleedingTooth — reside in the open-source BlueZ protocol stack
from The Hacker News https://ift.tt/3j1aWtB
via IFTTT
from The Hacker News https://ift.tt/3j1aWtB
via IFTTT
Google Warns of Zero-Click Bluetooth Flaws in Linux-based Devices
Reviewed by Muhammad Zeeshan Ali
on
October 16, 2020
Rating:
No comments: