The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
- http://www.ubuntu.com/usn/USN-2886-1
- http://www.ubuntu.com/usn/USN-2890-3
- https://github.com/torvalds/linux/commit/5233252fce714053f0151680933571a2da9cbfb4
No PoCs found on GitHub currently.