BleedingTooth: Vulnerabilities in Linux Bluetooth Allow Zero-Click Attacks

Bluetooth vulnerabilities that a Google security researcher has identified in the Linux kernel could be exploited to run arbitrary code or access sensitive information.

read more

Read more: BleedingTooth: Vulnerabilities in Linux Bluetooth Allow Zero-Click Attacks

Story added 14. October 2020, content source with full text you can find at link above.