2.1 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:N/I:P/A:N
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
10.1%
The evm_verify_hmac function in security/integrity/evm/evm_main.c in the Linux kernel before 4.5 does not properly copy data, which makes it easier for local users to forge MAC values via a timing side-channel attack.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=613317bd212c585c20796c10afe5daaa95d4b0a1
www.ubuntu.com/usn/USN-2946-1
www.ubuntu.com/usn/USN-2946-2
www.ubuntu.com/usn/USN-2947-1
www.ubuntu.com/usn/USN-2947-2
www.ubuntu.com/usn/USN-2947-3
www.ubuntu.com/usn/USN-2948-1
www.ubuntu.com/usn/USN-2948-2
www.ubuntu.com/usn/USN-2949-1
bugzilla.redhat.com/show_bug.cgi?id=1324867
github.com/torvalds/linux/commit/613317bd212c585c20796c10afe5daaa95d4b0a1
people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2085.html
security-tracker.debian.org/tracker/CVE-2016-2085
2.1 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:N/I:P/A:N
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
10.1%