Rapid7 Vulnerability & Exploit Database

Ubuntu: (Multiple Advisories) (CVE-2016-4578): Linux kernel (OMAP4) vulnerabilities

Back to Search

Ubuntu: (Multiple Advisories) (CVE-2016-4578): Linux kernel (OMAP4) vulnerabilities

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
05/23/2016
Created
07/25/2018
Added
06/27/2016
Modified
09/12/2020

Description

sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.

Solution(s)

  • ubuntu-upgrade-linux-image-3-13-0-91-generic
  • ubuntu-upgrade-linux-image-3-13-0-91-generic-lpae
  • ubuntu-upgrade-linux-image-3-13-0-91-lowlatency
  • ubuntu-upgrade-linux-image-3-13-0-91-powerpc-e500
  • ubuntu-upgrade-linux-image-3-13-0-91-powerpc-e500mc
  • ubuntu-upgrade-linux-image-3-13-0-91-powerpc-smp
  • ubuntu-upgrade-linux-image-3-13-0-91-powerpc64-emb
  • ubuntu-upgrade-linux-image-3-13-0-91-powerpc64-smp
  • ubuntu-upgrade-linux-image-3-16-0-76-generic
  • ubuntu-upgrade-linux-image-3-16-0-76-generic-lpae
  • ubuntu-upgrade-linux-image-3-16-0-76-lowlatency
  • ubuntu-upgrade-linux-image-3-16-0-76-powerpc-e500mc
  • ubuntu-upgrade-linux-image-3-16-0-76-powerpc-smp
  • ubuntu-upgrade-linux-image-3-16-0-76-powerpc64-emb
  • ubuntu-upgrade-linux-image-3-16-0-76-powerpc64-smp
  • ubuntu-upgrade-linux-image-3-19-0-64-generic
  • ubuntu-upgrade-linux-image-3-19-0-64-generic-lpae
  • ubuntu-upgrade-linux-image-3-19-0-64-lowlatency
  • ubuntu-upgrade-linux-image-3-19-0-64-powerpc-e500mc
  • ubuntu-upgrade-linux-image-3-19-0-64-powerpc-smp
  • ubuntu-upgrade-linux-image-3-19-0-64-powerpc64-emb
  • ubuntu-upgrade-linux-image-3-19-0-64-powerpc64-smp
  • ubuntu-upgrade-linux-image-3-2-0-105-generic
  • ubuntu-upgrade-linux-image-3-2-0-105-generic-pae
  • ubuntu-upgrade-linux-image-3-2-0-105-highbank
  • ubuntu-upgrade-linux-image-3-2-0-105-omap
  • ubuntu-upgrade-linux-image-3-2-0-105-powerpc-smp
  • ubuntu-upgrade-linux-image-3-2-0-105-powerpc64-smp
  • ubuntu-upgrade-linux-image-3-2-0-105-virtual
  • ubuntu-upgrade-linux-image-3-2-0-1483-omap4
  • ubuntu-upgrade-linux-image-4-2-0-1033-raspi2
  • ubuntu-upgrade-linux-image-4-2-0-41-generic
  • ubuntu-upgrade-linux-image-4-2-0-41-generic-lpae
  • ubuntu-upgrade-linux-image-4-2-0-41-lowlatency
  • ubuntu-upgrade-linux-image-4-2-0-41-powerpc-e500mc
  • ubuntu-upgrade-linux-image-4-2-0-41-powerpc-smp
  • ubuntu-upgrade-linux-image-4-2-0-41-powerpc64-emb
  • ubuntu-upgrade-linux-image-4-2-0-41-powerpc64-smp
  • ubuntu-upgrade-linux-image-4-4-0-1016-raspi2
  • ubuntu-upgrade-linux-image-4-4-0-1019-snapdragon
  • ubuntu-upgrade-linux-image-4-4-0-28-generic
  • ubuntu-upgrade-linux-image-4-4-0-28-generic-lpae
  • ubuntu-upgrade-linux-image-4-4-0-28-lowlatency
  • ubuntu-upgrade-linux-image-4-4-0-28-powerpc-e500mc
  • ubuntu-upgrade-linux-image-4-4-0-28-powerpc-smp
  • ubuntu-upgrade-linux-image-4-4-0-28-powerpc64-emb
  • ubuntu-upgrade-linux-image-4-4-0-28-powerpc64-smp

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;