CVE-2016-2543

Published on: 04/27/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:15 PM UTC

CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Certain versions of Linux Kernel from Linux contain the following vulnerability:

The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel before 4.4.1 does not verify FIFO assignment before proceeding with FIFO clearing, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call.

  • CVE-2016-2543 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 6.2 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 4.9 - MEDIUM

Access
Vector
Access
Complexity
Authentication
LOCAL LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE COMPLETE

CVE References

Description Tags Link
USN-2929-2: Linux kernel (Trusty HWE) vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2929-2
USN-2931-1: Linux kernel (Utopic HWE) vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2931-1
USN-2967-2: Linux kernel (OMAP4) vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2967-2
Debian -- Security Information -- DSA-3503-1 linux www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3503
Vendor Advisory
www.kernel.org
text/plain
URL Logo CONFIRM www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
USN-2930-3: Linux kernel (Raspberry Pi 2) vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2930-3
1311554 – (CVE-2016-2543) CVE-2016-2543 kernel: sound: GPF in snd_seq_fifo_clear bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1311554
USN-2930-1: Linux kernel vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2930-1
USN-2930-2: Linux kernel (Wily HWE) vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2930-2
kernel/git/torvalds/linux.git - Linux kernel source tree Vendor Advisory
git.kernel.org
text/html
URL Logo CONFIRM git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=030e2c78d3a91dd0d27fef37e91950dde333eba1
[security-announce] SUSE-SU-2016:1102-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1102
ALSA: seq: Fix missing NULL check at remove_events ioctl · torvalds/[email protected] · GitHub Patch
Vendor Advisory
github.com
text/html
URL Logo CONFIRM github.com/torvalds/linux/commit/030e2c78d3a91dd0d27fef37e91950dde333eba1
[security-announce] SUSE-SU-2016:2074-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:2074
oss-security - Security bugs in Linux kernel sound subsystem www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160119 Security bugs in Linux kernel sound subsystem
Linux Kernel CVE-2016-2543 Null Pointer Deference Local Denial of Service Vulnerability cve.report (archive)
text/html
URL Logo BID 83377
USN-2932-1: Linux kernel (Vivid HWE) vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2932-1
USN-2967-1: Linux kernel vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2967-1
USN-2929-1: Linux kernel vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2929-1
Linux Kernel Sound Driver Null Pointer Dereference in snd_seq_ioctl_remove_events() Lets Local Users Cause Denial of Service Conditions on the Target System - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035304
[security-announce] SUSE-SU-2016:0911-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:0911

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
LinuxLinux KernelAllAllAllAll
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*: