CVE-2016-4578

5.5 MEDIUM
Published: May 23, 2016 Modified: May 06, 2026
View on NVD

Description

sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2574.html
Source: cve@mitre.org
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2584.html
Source: cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2016/dsa-3607
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/90535
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-3016-1
Source: cve@mitre.org
Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-2
Source: cve@mitre.org
Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-3
Source: cve@mitre.org
Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-4
Source: cve@mitre.org
Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-1
Source: cve@mitre.org
Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-2
Source: cve@mitre.org
Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-3
Source: cve@mitre.org
Third Party Advisory
http://www.ubuntu.com/usn/USN-3018-1
Source: cve@mitre.org
Third Party Advisory
http://www.ubuntu.com/usn/USN-3018-2
Source: cve@mitre.org
Third Party Advisory
http://www.ubuntu.com/usn/USN-3019-1
Source: cve@mitre.org
Third Party Advisory
http://www.ubuntu.com/usn/USN-3020-1
Source: cve@mitre.org
Third Party Advisory
http://www.ubuntu.com/usn/USN-3021-1
Source: cve@mitre.org
Third Party Advisory
http://www.ubuntu.com/usn/USN-3021-2
Source: cve@mitre.org
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1335215
Source: cve@mitre.org
Issue Tracking Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/46529/
Source: cve@mitre.org
Exploit Third Party Advisory VDB Entry
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2574.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2584.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2016/dsa-3607
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/05/11/5
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.securityfocus.com/bid/90535
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-3016-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-3
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3016-4
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3017-3
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3018-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3018-2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3019-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3020-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3021-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ubuntu.com/usn/USN-3021-2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1335215
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory VDB Entry
https://github.com/torvalds/linux/commit/9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://github.com/torvalds/linux/commit/e4ec8cc8039a7063e24204299b462bd1383184a5
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.exploit-db.com/exploits/46529/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry

62 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.5 / 10.0
EPSS (Exploit Probability)
0.2%
37th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

debian opensuse linux canonical redhat