CVE-2015-8575 PUBLISHED

The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.

EPSS 0.01% · 2.2th percentile

Risk Scores

EPSS Score
0.01%
2.2th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSlinux-azure4.15.0-1028.29, 0, 4.15.0-1002.2
Ubuntu:24.04:LTSlinux-raspi-realtime6.8.0-2019.20, 0
Ubuntu:24.04:LTSlinux-azure-6.116.11.0-1012.12~24.04.1, 6.11.0-1008.8~24.04.1, 0
Ubuntu:20.04:LTSlinux-raspi25.3.0-1014.16, 5.3.0-1015.17, 5.3.0-1017.19
Ubuntu:22.04:LTSlinux-realtime5.15.0-1032.35, 0
Ubuntu:20.04:LTSlinux-riscv5.4.0-33.37, 5.4.0-40.45, 5.4.0-39.44
Ubuntu:24.04:LTSlinux-realtime6.8.1-1015.16, 0
Ubuntu:18.04:LTSlinux-hwe-edge5.3.0-23.25~18.04.2, 5.3.0-23.25~18.04.1, 5.0.0-17.18~18.04.1
Ubuntu:20.04:LTSlinux-azure-fde5.4.0-1086.91+cvm1.1, 5.4.0-1064.67+cvm1.1, 5.4.0-1065.68+cvm2.1
Ubuntu:14.04:LTSlinux-lts-wily4.2.0-18.22~14.04.1, 4.2.0-21.25~14.04.1, 0
Ubuntu:24.04:LTSlinux-lowlatency-hwe-6.116.11.0-1012.13~24.04.1, 0, 6.11.0-1009.10~24.04.1
Ubuntu:24.04:LTSlinux-gcp-6.116.11.0-1016.16~24.04.1, 6.11.0-1006.6~24.04.2, 0
Ubuntu:18.04:LTSlinux-gcp5.0.0-1031.32, 5.0.0-1034.35, 0
Ubuntu:20.04:LTSlinux-gke5.4.0-1087.94, 5.4.0-1090.97, 5.4.0-1091.98
Ubuntu:Pro:20.04:LTSlinux-azure-fde-5.155.15.0-1031.38~20.04.1.1, 5.15.0-1103.112~20.04.1.1, 5.15.0-1102.111~20.04.1.1
Ubuntu:24.04:LTSlinux-hwe-6.116.11.0-28.28~24.04.1, 6.11.0-29.29~24.04.1, 0
Ubuntu:24.04:LTSlinux-riscv6.8.0-38.38.1, 6.8.0-39.39.1, 6.8.0-40.40.1
Ubuntu:20.04:LTSlinux-gkeop5.4.0-1056.60, 0, 5.4.0-1008.9
Ubuntu:18.04:LTSlinux-hwe5.3.0-67.61, 5.3.0-66.60, 5.3.0-65.59
Ubuntu:14.04:LTSlinux3.13.0-10.30, 3.13.0-8.28, 3.13.0-8.27

…and 4 more

Timeline

References

Open in Interactive Console →