The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
References
Configurations
Information
Published : 2016-02-07 19:59
Updated : 2017-11-03 18:29
NVD link : CVE-2015-8575
Mitre link : CVE-2015-8575
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
linux
- linux_kernel