The evm_verify_hmac function in security/integrity/evm/evm_main.c in the Linux kernel before 4.5 does not properly copy data, which makes it easier for local users to forge MAC values via a timing side-channel attack.
Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Link | Tags |
---|---|
http://www.ubuntu.com/usn/USN-2949-1 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1324867 | |
https://security-tracker.debian.org/tracker/CVE-2016-2085 | |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=613317bd212c585c20796c10afe5daaa95d4b0a1 | vendor advisory |
http://www.ubuntu.com/usn/USN-2947-3 | vendor advisory |
http://www.ubuntu.com/usn/USN-2947-2 | vendor advisory |
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2085.html | |
http://www.ubuntu.com/usn/USN-2947-1 | vendor advisory |
http://www.ubuntu.com/usn/USN-2946-2 | vendor advisory |
https://github.com/torvalds/linux/commit/613317bd212c585c20796c10afe5daaa95d4b0a1 | patch vendor advisory |
http://www.ubuntu.com/usn/USN-2948-1 | vendor advisory |
http://www.ubuntu.com/usn/USN-2946-1 | vendor advisory |
http://www.ubuntu.com/usn/USN-2948-2 | vendor advisory |