CVE-2015-8575

Published: 17 December 2015

The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.

From the Ubuntu security team

David Miller discovered that the Bluetooth implementation in the Linux kernel did not properly validate the socket address length for Synchronous Connection-Oriented (SCO) sockets. A local attacker could use this to expose sensitive information.

Priority

Medium

CVSS 3 base score: 4.0

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by 5233252fce714053f0151680933571a2da9cbfb4
linux-2.6
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (4.4~rc6)