The evm_verify_hmac function in security/integrity/evm/evm_main.c in the Linux kernel before 4.5 does not properly copy data, which makes it easier for local users to forge MAC values via a timing side-channel attack.
http://www.ubuntu.com/usn/USN-2946-1
http://www.ubuntu.com/usn/USN-2946-2
http://www.ubuntu.com/usn/USN-2947-1
http://www.ubuntu.com/usn/USN-2947-2
http://www.ubuntu.com/usn/USN-2947-3
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2949-1
https://bugzilla.redhat.com/show_bug.cgi?id=1324867
https://github.com/torvalds/linux/commit/613317bd212c585c20796c10afe5daaa95d4b0a1
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2085.html
Source: MITRE
Published: 2016-04-27
Updated: 2016-12-03
Type: CWE-19
Base Score: 2.1
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact Score: 2.9
Exploitability Score: 3.9
Severity: LOW
Base Score: 5.5
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Impact Score: 3.6
Exploitability Score: 1.8
Severity: MEDIUM