Kernel Memory Information Disclosure and KASLR Bypass Vulnerability

Kernel Memory Information Disclosure and KASLR Bypass Vulnerability

CVE-2015-8575 · LOW Severity

AV:L/AC:L/AU:N/C:P/I:N/A:N

The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.

Learn more about our Cis Benchmark Audit For Bind.