Stylized image of a floating padlock.

Google and Intel are warning of a high-severity Bluetooth flaw in all however the newest model of the Linux Kernel. Whereas a Google researcher stated the bug permits seamless code execution by attackers inside Bluetooth vary, Intel is characterizing the flaw as offering an escalation of privileges or the disclosure of data.

The flaw resides in BlueZ, the software program stack that by default implements all Bluetooth core protocols and layers for Linux. In addition to Linux laptops, it is utilized in many shopper or industrial Web-of-things gadgets. It really works with Linux variations 2.4.6 and later.

Looking for particulars

Up to now, little is thought about BleedingTooth, the identify given by Google engineer Andy Nguyen, who stated {that a} weblog put up can be revealed “quickly.” A Twitter thread and a YouTube video present essentially the most element and provides the impression that the bug offers a dependable manner for close by attackers to execute malicious code of their selection on weak Linux gadgets that use BlueZ for Bluetooth.

“BleedingTooth is a set of zero-click vulnerabilities within the Linux Bluetooth subsystem that may permit an unauthenticated distant attacker briefly distance to execute arbitrary code with kernel privileges on weak gadgets,” the researcher wrote. He stated his discovery was impressed by analysis that led to BlueBorne, one other proof-of-concept exploit that allowed attackers to ship instructions of their selection with out requiring gadget customers click on any hyperlinks, connect with a rogue Bluetooth gadget, or take another motion in need of having Bluetooth turned on.

Under is the YouTube video demonstrating how the exploit works.

BleedingTooth: Linux Bluetooth Zero-Click on Distant Code Execution

Intel, in the meantime, has issued this bare-bones advisory that categorizes the flaw as privilege-escalation or information-disclosure vulnerability. The advisory assigned a severity rating of 8.3 out of a doable 10 to CVE-2020-12351, considered one of three distinct bugs that comprise BleedingTooth.

“Potential safety vulnerabilities in BlueZ could permit escalation of privilege or info disclosure,” the advisory states. “BlueZ is releasing Linux kernel fixes to handle these potential vulnerabilities.”

Intel, which is a major contributor to the BlueZ open supply challenge, stated that the simplest strategy to patch the vulnerabilities is to replace to Linux kernel model 5.9, which was revealed on Sunday. Those that can’t improve to model 5.9 can set up a sequence of kernel patches the advisory hyperlinks to. Maintainers of BlueZ didn’t instantly reply to emails asking for added particulars about this vulnerability.


Please enter your comment!
Please enter your name here