The evm_verify_hmac function in security/integrity/evm/evm_main.c in the Linux kernel before 4.5 does not properly copy data, which makes it easier for local users to forge MAC values via a timing side-channel attack.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=613317bd212c585c20796c10afe5daaa95d4b0a1
www.ubuntu.com/usn/USN-2946-1
www.ubuntu.com/usn/USN-2946-2
www.ubuntu.com/usn/USN-2947-1
www.ubuntu.com/usn/USN-2947-2
www.ubuntu.com/usn/USN-2947-3
www.ubuntu.com/usn/USN-2948-1
www.ubuntu.com/usn/USN-2948-2
www.ubuntu.com/usn/USN-2949-1
bugzilla.redhat.com/show_bug.cgi?id=1324867
github.com/torvalds/linux/commit/613317bd212c585c20796c10afe5daaa95d4b0a1
people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2085.html
security-tracker.debian.org/tracker/CVE-2016-2085