First published: Thu Apr 07 2016(Updated: )
A timing side channel vulnerability was discovered in the Linux Extended Verification Module (EVM). An attacker could use this to affect system integrity. The problem exists because the vm_verify_hmac() function includes a use of memcmp(). This function is not safe to be used for comparing memory, allows timing side channel attacks; specifically a MAC forgery complexity drop from 2^128 to 2^12. This patch changes the memcmp() to the cryptographically safe crypto_memneq(). Upstream fix: <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=613317bd212c585c20796c10afe5daaa95d4b0a1">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=613317bd212c585c20796c10afe5daaa95d4b0a1</a> Original bug report: <a href="http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2085.html">http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2085.html</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.4.8 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2016-2085.
The severity of CVE-2016-2085 is medium.
The affected software is Linux kernel versions before 4.5.
CVE-2016-2085 makes it easier for local users to forge MAC values via a timing side-channel attack.
To fix CVE-2016-2085, update your Linux kernel to version 4.5 or later.