Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Google warns of a severe bluetooth flaw 'Bleedingtooth' in Linux Kernel.
- This topic has 1 reply, 1 voice, and was last updated 4 months, 2 weeks ago by .
-
Topic
-
There is a severe Bluetooth flaw that is affecting the Bluetooth stack, it is persistent on Linux machines that are running kernel versions below Linux 5.9 that support BlueZ. BlueZ allows an unauthenticated attacker to enable escalation of privilege by using adjacent access. BlueZ is found on many machines since it is official Linux Bluetooth stack. BlueZ may also allow an unauthenticated user to potentially enable information disclosure via adjacent access and may allow an unauthenticated user to potentially enable denial of service via adjacent access. There has been a Linux kernel fix released to fix the flaws, they are called CVE-2020-12351, CVE-2020-12352 and CVE-2020-24490, they were released by the BlueZ project.
https://www.zdnet.com/article/google-warns-of-severe-bleedingtooth-bluetooth-flaw-in-linux-kernel/
You must be logged in to reply to this topic.