BleedingTooth: Vulnerabilities in Linux Bluetooth Allow Zero-Click Attacks
Bluetooth vulnerabilities that a Google security researcher has identified in the Linux kernel could be exploited to run arbitrary code or access sensitive information.
Read more: BleedingTooth: Vulnerabilities in Linux Bluetooth Allow Zero-Click Attacks
Story added 14. October 2020, content source with full text you can find at link above.