First published: Mon Sep 19 2016(Updated: )
A heap-buffer overflow vulnerability was found in the arcmsr_iop_message_xfer() function in 'drivers/scsi/arcmsr/arcmsr_hba.c' file in the Linux kernel through 4.8.2. The function does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code. This can potentially cause kernel heap corruption and arbitrary kernel code execution. Upstream patch: <a href="http://marc.info/?l=linux-scsi&m=147394713328707&w=2">http://marc.info/?l=linux-scsi&m=147394713328707&w=2</a> <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7bc2b55a5c030685b399bb65b6baa9ccc3d1f167">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7bc2b55a5c030685b399bb65b6baa9ccc3d1f167</a> <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4bd173c30792791a6daca8c64793ec0a4ae8324f">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4bd173c30792791a6daca8c64793ec0a4ae8324f</a> Discussion thread: <a href="http://marc.info/?t=147394719700004&r=1&w=2">http://marc.info/?t=147394719700004&r=1&w=2</a> References: <a href="http://seclists.org/oss-sec/2016/q3/535">http://seclists.org/oss-sec/2016/q3/535</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=3.2<3.2.84 | |
Linux Linux kernel | >=3.3<3.10.105 | |
Linux Linux kernel | >=3.11<3.12.67 | |
Linux Linux kernel | >=3.13<3.16.39 | |
Linux Linux kernel | >=3.17<3.18.46 | |
Linux Linux kernel | >=3.19<4.1.37 | |
Linux Linux kernel | >=4.2<4.4.27 | |
Linux Linux kernel | >=4.5<4.7.10 | |
Linux Linux kernel | >=4.8<4.8.4 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =16.10 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2016-7425.
The severity level of CVE-2016-7425 is low.
CVE-2016-7425 allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) in the Linux kernel through version 4.8.2.
The Linux kernel versions up to 4.8.2 are affected by CVE-2016-7425.
You can find more information about CVE-2016-7425 at the following references: [link1], [link2], [link3].