CVE Details

Release Date:2016-02-07


The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernelbefore 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.

See more information about CVE-2015-8575 from MITRE CVE dictionary and NIST NVD

CVSS v2.0 metrics

NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.

Base Score: 2.1 Base Metrics: AV:L/AC:L/Au:N/C:P/I:N/A:N
Access Vector: Local network Attack Complexity: Low
Authentication: None required Confidentiality Impact: Partial
Integrity Impact: None Availability Impact: None

Errata information

PlatformErrataRelease Date
Oracle Linux version 5 (kernel-uek)ELSA-2018-41722018-07-17
Oracle Linux version 6 (dtrace-modules-3.8.13-118.22.1.el6uek)ELSA-2018-41642018-07-10
Oracle Linux version 6 (kernel-uek)ELSA-2018-41642018-07-10
Oracle Linux version 6 (kernel-uek)ELSA-2018-41722018-07-17
Oracle Linux version 7 (dtrace-modules-3.8.13-118.22.1.el7uek)ELSA-2018-41642018-07-10
Oracle Linux version 7 (kernel-uek)ELSA-2018-41642018-07-10
Oracle VM version 3.3 (kernel-uek)OVMSA-2018-02372018-07-10

This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team