vulnerability
Ubuntu: (Multiple Advisories) (CVE-2016-7425): Linux kernel vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Oct 16, 2016 | Dec 1, 2016 | Apr 14, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Oct 16, 2016
Added
Dec 1, 2016
Modified
Apr 14, 2025
Description
Marco Grassi discovered that the driver for Areca RAID Controllers in the
Linux kernel did not properly validate control messages. A local attacker
could use this to cause a denial of service (system crash) or possibly gain
privileges.
Solution(s)
ubuntu-upgrade-linux-image-3-13-0-103-genericubuntu-upgrade-linux-image-3-13-0-103-generic-lpaeubuntu-upgrade-linux-image-3-13-0-103-lowlatencyubuntu-upgrade-linux-image-3-13-0-103-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-103-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-103-powerpc-smpubuntu-upgrade-linux-image-3-13-0-103-powerpc64-embubuntu-upgrade-linux-image-3-13-0-103-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-116-genericubuntu-upgrade-linux-image-3-2-0-116-generic-paeubuntu-upgrade-linux-image-3-2-0-116-highbankubuntu-upgrade-linux-image-3-2-0-116-omapubuntu-upgrade-linux-image-3-2-0-116-powerpc-smpubuntu-upgrade-linux-image-3-2-0-116-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-116-virtualubuntu-upgrade-linux-image-3-2-0-1494-omap4ubuntu-upgrade-linux-image-4-4-0-1038-raspi2ubuntu-upgrade-linux-image-4-4-0-1042-snapdragonubuntu-upgrade-linux-image-4-4-0-51-genericubuntu-upgrade-linux-image-4-4-0-51-generic-lpaeubuntu-upgrade-linux-image-4-4-0-51-lowlatencyubuntu-upgrade-linux-image-4-4-0-51-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-51-powerpc-smpubuntu-upgrade-linux-image-4-4-0-51-powerpc64-embubuntu-upgrade-linux-image-4-4-0-51-powerpc64-smpubuntu-upgrade-linux-image-4-8-0-1021-raspi2ubuntu-upgrade-linux-image-4-8-0-28-genericubuntu-upgrade-linux-image-4-8-0-28-generic-lpaeubuntu-upgrade-linux-image-4-8-0-28-lowlatencyubuntu-upgrade-linux-image-4-8-0-28-powerpc-e500mcubuntu-upgrade-linux-image-4-8-0-28-powerpc-smpubuntu-upgrade-linux-image-4-8-0-28-powerpc64-embubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-generic-paeubuntu-upgrade-linux-image-highbankubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-omapubuntu-upgrade-linux-image-omap4ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-lts-xenial
References
- CVE-2016-7425
- https://attackerkb.com/topics/CVE-2016-7425
- DEBIAN-DLA-670-1
- DEBIAN-DSA-3696
- NVD-CVE-2016-7425
- UBUNTU-USN-3144-1
- UBUNTU-USN-3144-2
- UBUNTU-USN-3145-1
- UBUNTU-USN-3145-2
- UBUNTU-USN-3146-1
- UBUNTU-USN-3146-2
- UBUNTU-USN-3147-1
- UBUNTU-USN-3160-1
- UBUNTU-USN-3160-2
- UBUNTU-USN-3161-1
- UBUNTU-USN-3161-2
- UBUNTU-USN-3161-3
- UBUNTU-USN-3161-4
- UBUNTU-USN-3162-1
- UBUNTU-USN-3162-2
- UBUNTU-USN-3187-1
- UBUNTU-USN-3187-2
- UBUNTU-USN-3188-1
- UBUNTU-USN-3188-2
- UBUNTU-USN-3290-1
- UBUNTU-USN-3422-1
- UBUNTU-USN-3422-2
- UBUNTU-USN-3445-1
- UBUNTU-USN-3445-2

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.