Medium severity5.5NVD Advisory· Published May 23, 2016· Updated May 6, 2026
CVE-2016-4578
CVE-2016-4578
Description
sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.
Affected products
20cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
31- www.exploit-db.com/exploits/46529/nvdExploitThird Party AdvisoryVDB Entry
- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdVendor Advisory
- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.htmlnvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-2574.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-2584.htmlnvdThird Party Advisory
- www.debian.org/security/2016/dsa-3607nvdThird Party Advisory
- www.securityfocus.com/bid/90535nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-3016-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-3016-2nvdThird Party Advisory
- www.ubuntu.com/usn/USN-3016-3nvdThird Party Advisory
- www.ubuntu.com/usn/USN-3016-4nvdThird Party Advisory
- www.ubuntu.com/usn/USN-3017-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-3017-2nvdThird Party Advisory
- www.ubuntu.com/usn/USN-3017-3nvdThird Party Advisory
- www.ubuntu.com/usn/USN-3018-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-3018-2nvdThird Party Advisory
- www.ubuntu.com/usn/USN-3019-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-3020-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-3021-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-3021-2nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party AdvisoryVDB Entry
- github.com/torvalds/linux/commit/9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6nvdVendor Advisory
- github.com/torvalds/linux/commit/e4ec8cc8039a7063e24204299b462bd1383184a5nvdVendor Advisory
- www.openwall.com/lists/oss-security/2016/05/11/5nvdMailing List
News mentions
0No linked articles in our index yet.