CVE-2016-4569

The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.

Published : 2016-05-23 10:59 Updated : 2018-01-05 02:30

2.1
CVSS Score More info
Score 2.1 / 10
2.1
Vendor Product Version URI
Linux Linux Kernel 4.6 cpe:/o:linux:linux_kernel:4.6
Canonical Ubuntu Linux 12.04 cpe:/o:canonical:ubuntu_linux:12.04::~~lts~~~
Novell Suse Linux Enterprise Debuginfo 11.0 cpe:/o:novell:suse_linux_enterprise_debuginfo:11.0:sp4
Novell Suse Linux Enterprise Server 12.0 cpe:/o:novell:suse_linux_enterprise_server:12.0
Canonical Ubuntu Linux 16.04 cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~
Novell Suse Linux Enterprise Server 12.0 cpe:/o:novell:suse_linux_enterprise_server:12.0:sp1
Novell Suse Linux Enterprise Real Time Extension 12.0 cpe:/o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1
Novell Suse Linux Enterprise Server 11.0 cpe:/o:novell:suse_linux_enterprise_server:11.0:extra
Canonical Ubuntu Linux 14.04 cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~
Novell Suse Linux Enterprise Server 11.0 cpe:/o:novell:suse_linux_enterprise_server:11.0:sp4
Novell Suse Linux Enterprise Live Patching 12.0 cpe:/o:novell:suse_linux_enterprise_live_patching:12.0
Novell Suse Linux Enterprise Workstation Extension 12.0 cpe:/o:novell:suse_linux_enterprise_workstation_extension:12.0
Novell Suse Linux Enterprise Module For Public Cloud 12.0 cpe:/o:novell:suse_linux_enterprise_module_for_public_cloud:12.0
Novell Suse Linux Enterprise Software Development Kit 11.0 cpe:/o:novell:suse_linux_enterprise_software_development_kit:11.0:sp4
Canonical Ubuntu Linux 15.10 cpe:/o:canonical:ubuntu_linux:15.10
Novell Suse Linux Enterprise Workstation Extension 12.0 cpe:/o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1
Novell Suse Linux Enterprise Desktop 12.0 cpe:/o:novell:suse_linux_enterprise_desktop:12.0:sp1
Novell Suse Linux Enterprise Software Development Kit 12.0 cpe:/o:novell:suse_linux_enterprise_software_development_kit:12.0:sp1
Novell Suse Linux Enterprise Desktop 12.0 cpe:/o:novell:suse_linux_enterprise_desktop:12.0
Novell Suse Linux Enterprise Software Development Kit 12.0 cpe:/o:novell:suse_linux_enterprise_software_development_kit:12.0
  1. Novell (8) Search CVE
    1. Suse Linux Enterprise Desktop (1) Search CVE
      1. 12.0
    2. Suse Linux Enterprise Live Patching (1) Search CVE
      1. 12.0
    3. Suse Linux Enterprise Server (2) Search CVE
      1. 12.0
      2. 11.0
    4. Suse Linux Enterprise Debuginfo (1) Search CVE
      1. 11.0
    5. Suse Linux Enterprise Workstation Extension (1) Search CVE
      1. 12.0
    6. Suse Linux Enterprise Software Development Kit (2) Search CVE
      1. 11.0
      2. 12.0
    7. Suse Linux Enterprise Real Time Extension (1) Search CVE
      1. 12.0
    8. Suse Linux Enterprise Module For Public Cloud (1) Search CVE
      1. 12.0
  2. Linux (1) Search CVE
    1. Linux Kernel (1) Search CVE
      1. 4.6
  3. Canonical (1) Search CVE
    1. Ubuntu Linux (4) Search CVE
      1. 12.04
      2. 16.04
      3. 14.04
      4. 15.10

CWE

ID Name Description Links
CWE-200 Information Exposure An information exposure is the intentional or unintentional disclosure of information to an actor that is not explicitly authorized to have access to that information. CVE

References

Source Link
CONFIRM http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cec8f96e49d9be372fdb0c3836dcf31ec71e457e
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
DEBIAN http://www.debian.org/security/2016/dsa-3607
MLIST http://www.openwall.com/lists/oss-security/2016/05/09/17
BID http://www.securityfocus.com/bid/90347
UBUNTU http://www.ubuntu.com/usn/USN-3016-1
UBUNTU http://www.ubuntu.com/usn/USN-3016-2
UBUNTU http://www.ubuntu.com/usn/USN-3016-3
UBUNTU http://www.ubuntu.com/usn/USN-3016-4
UBUNTU http://www.ubuntu.com/usn/USN-3017-1
UBUNTU http://www.ubuntu.com/usn/USN-3017-2
UBUNTU http://www.ubuntu.com/usn/USN-3017-3
UBUNTU http://www.ubuntu.com/usn/USN-3018-1
UBUNTU http://www.ubuntu.com/usn/USN-3018-2
UBUNTU http://www.ubuntu.com/usn/USN-3019-1
UBUNTU http://www.ubuntu.com/usn/USN-3020-1
UBUNTU http://www.ubuntu.com/usn/USN-3021-1
UBUNTU http://www.ubuntu.com/usn/USN-3021-2
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1334643
CONFIRM https://github.com/torvalds/linux/commit/cec8f96e49d9be372fdb0c3836dcf31ec71e457e
REDHAT http://rhn.redhat.com/errata/RHSA-2016-2574.html
REDHAT http://rhn.redhat.com/errata/RHSA-2016-2584.html

History of changes