The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: google_android
Published: 2017-02-07T07:02:00
Updated: 2024-08-06T03:07:32.042Z
Reserved: 2016-12-26T00:00:00
Link: CVE-2016-10044
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2017-02-07T07:59:00.293
Modified: 2023-01-17T21:40:37.717
Link: CVE-2016-10044
Redhat