Kernel Memory Information Disclosure and KASLR Bypass Vulnerability
CVE-2015-8575 · LOW Severity
AV:L/AC:L/AU:N/C:P/I:N/A:N
The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
Learn more about our Cis Benchmark Audit For Bind.