ADVERTISEMENT
  • About
  • Privacy Policy
  • Careers
  • Contact
  • Advertise
    • Terms of Use
    • DMCA Copyright Infringement Notification
  • Contact
Thursday, March 23, 2023
  • Login
No Result
View All Result
Internship
AwareEarth
  • Home
  • World
  • Politics
  • Business
  • Science
  • Tech
  • Entertainment
  • Lifestyle
  • Web Stories
  • Internship
    • Internship Video Tutorial
  • Home
  • World
  • Politics
  • Business
  • Science
  • Tech
  • Entertainment
  • Lifestyle
  • Web Stories
  • Internship
    • Internship Video Tutorial
No Result
View All Result
AwareEarth
No Result
View All Result
Home News

A bluetooth flaw in Linux devices detected by Google

by Editor_Seher
December 27, 2022
in News
Reading Time: 2 min
0
Bluetooth flaw in Linux devices
1
SHARES
14
VIEWS
Share on FacebookShare on Twitter

The Bluetooth flaw in Linux devices according to Google. The researchers from google security are warning the users of the new set of problems in zero-click of in the Linux Bluetooth software. These problems will make it easy for hackers or attackers to get access to people’s device. The security engineer, Andy Nguyen, found three flaws also known as BleedingTooth.

Linux kernel is a widely used operating system. The company is facing a problem with its security. This makes it easier for hackers to get personal information from the devices that are using Linux.

The Bluetooth flaw in Linux devices list:

Firstly, the problem is the Logical Link Control and Adaptation Protocol of the Bluetooth. Moreover, Google security claims that a hacker nearby a Linux device can send a malicious file through Bluetooth. That file can give the hacker the green signal to attack the device. Moreover, Malicious Bluetooth chips also get the hacking activity a head start. The exact location of the Bluetooth flaw in Linux devices unknown.

Secondly, the Linux devices are deprived of a patch in the computer systems. This causes the second vulnerability. The problem is found in Linux 3.6 and higher models.

In 2012, Linuz made changes in core Alternate MAC-PHY Manager Protocol (A2MP). This is basically a link to make for high-speed communication through Bluetooth High Speed. Helps large documents to transfer from one device to the other. A hacker closer to the device can bring back the pile of data from the transfer. As a result, the information can be used for the hacker’s advantage.

Bluetooth flaw in Linux devices

Thirdly, this flaw found in Host Controller Interface. The purpose of the Host Controller Interface is to sending commands, receiving events, and for transmitting data. The Linux kernel 4.19 and higher devices show an overflow to data. That enables the hacker to hack into the device.

Also read:

HOTSTAR MOD APK [IPL LIVE WORKING] V11.1.0 [DISNEY+ FEATURES FREE]

Previous Post

Indian Army Recruitment 2020: Vacancy for SSC Technician

Next Post

Rhonda Fleming Died: Hollywood Lost The Queen of Technicolor

Editor_Seher

Just started as a content writer.

Next Post
Rhonda Fleming

Rhonda Fleming Died: Hollywood Lost The Queen of Technicolor

Popular News

    Recommended

    ASUS TUF GAMING A15&A17

    ASUS TUF GAMING A15&A17

    3 years ago
    18
    iPhone 11 to be made locally in India!

    iPhone 11 to be made locally in India!

    3 years ago
    18

    Connect with us

    AwareEarth

    © 2023 AwareEarth - By Jotters Tech Private Limited

    Navigate Site

    • About
    • Privacy Policy
    • Careers
    • Contact
    • Advertise
    • Contact

    Follow Us

    No Result
    View All Result
    • Home
    • Politics
    • World
    • Business
    • Science
    • National
    • Entertainment
    • Gaming
    • Movie
    • Music
    • Sports
    • Fashion
    • Lifestyle
    • Travel
    • Tech
    • Health
    • Food
    • Internship
      • Internship Video Tutorial
    • Web Stories

    © 2023 AwareEarth - By Jotters Tech Private Limited

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Create New Account!

    Fill the forms below to register

    All fields are required. Log In

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In
    This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.