Vulnerability Description
The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 4.3.2 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=09ccfd
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.h
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://twitter.com/grsecurity/statuses/676744240802750464
- http://www.debian.org/security/2016/dsa-3434
- http://www.openwall.com/lists/oss-security/2015/12/15/11
- http://www.securityfocus.com/bid/79428
- http://www.securitytracker.com/id/1034549
- http://www.ubuntu.com/usn/USN-2886-1
- http://www.ubuntu.com/usn/USN-2888-1
- http://www.ubuntu.com/usn/USN-2890-1
- http://www.ubuntu.com/usn/USN-2890-2
- http://www.ubuntu.com/usn/USN-2890-3
FAQ
What is CVE-2015-8569?
CVE-2015-8569 is a vulnerability with a CVSS score of 2.3 (LOW). The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information f...
How severe is CVE-2015-8569?
CVE-2015-8569 has been rated LOW with a CVSS base score of 2.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-8569?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.