Google and Intel warn of high-severity Bluetooth security bug in Linux

Stylized image of a floating padlock.

Google and Intel are caution of a high-severity Bluetooth flaw in all however the latest model of the Linux Kernel. Whilst a Google researcher stated the worm permits seamless code execution through attackers inside Bluetooth vary, Intel is characterizing the flaw as offering an escalation of privileges or the disclosure of knowledge.

The flaw is living in BlueZ, the tool stack that through default implements all Bluetooth core protocols and layers for Linux. But even so Linux laptops, it is utilized in many shopper or commercial Web-of-things gadgets. It really works with Linux variations 2.four.6 and later.

On the lookout for main points

Thus far, little is understood about BleedingTooth, the identify given through Google engineer Andy Nguyen, who stated that a weblog publish shall be printed “quickly.” A Twitter thread and a YouTube video give you the maximum element and provides the impact that the worm supplies a competent method for within reach attackers to execute malicious code in their selection on inclined Linux gadgets that use BlueZ for Bluetooth.

“BleedingTooth is a suite of zero-click vulnerabilities within the Linux Bluetooth subsystem that may permit an unauthenticated far flung attacker briefly distance to execute arbitrary code with kernel privileges on inclined gadgets,” the researcher wrote. He stated his discovery used to be impressed through analysis that ended in BlueBorne, every other proof-of-concept exploit that allowed attackers to ship instructions in their selection with out requiring software customers click on any hyperlinks, connect with a rogue Bluetooth software, or take every other motion in need of having Bluetooth grew to become on.

Underneath is the YouTube video demonstrating how the exploit works.

BleedingTooth: Linux Bluetooth 0-Click on Faraway Code Execution

Intel, in the meantime, has issued this bare-bones advisory that categorizes the flaw as privilege-escalation or information-disclosure vulnerability. The advisory assigned a severity rating of eight.three out of a conceivable 10 to CVE-2020-12351, one in every of 3 distinct insects that contain BleedingTooth.

“Possible safety vulnerabilities in BlueZ might permit escalation of privilege or news disclosure,” the advisory states. “BlueZ is freeing Linux kernel fixes to handle those possible vulnerabilities.”

Intel, which is a number one contributor to the BlueZ open supply challenge, stated that top-of-the-line method to patch the vulnerabilities is to replace to Linux kernel model five.nine, which used to be printed on Sunday. Those that can’t improve to model five.nine can set up a chain of kernel patches the advisory hyperlinks to. Maintainers of BlueZ didn’t right away reply to emails asking for extra information about this vulnerability.

Leave a Reply

Your email address will not be published. Required fields are marked *