CVE-2016-10044

The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:google:android:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-02-07 07:59

Updated : 2024-02-28 15:44


NVD link : CVE-2016-10044

Mitre link : CVE-2016-10044

CVE.ORG link : CVE-2016-10044


JSON object : View

Products Affected

linux

  • linux_kernel

google

  • android
CWE
CWE-264

Permissions, Privileges, and Access Controls