The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.
Metrics
Affected Vendors & Products
References
History
Mon, 21 Oct 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: google_android
Published: 2017-02-07T07:02:00
Updated: 2024-10-21T13:14:17.686Z
Reserved: 2016-12-26T00:00:00
Link: CVE-2016-10044
Vulnrichment
Updated: 2024-08-06T03:07:32.042Z
NVD
Status : Modified
Published: 2017-02-07T07:59:00.293
Modified: 2024-11-21T02:43:09.190
Link: CVE-2016-10044
Redhat