CVE-2016-10044 PUBLISHED

The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.

EPSS 0.00% · 0.2th percentile

Risk Scores

EPSS Score
0.00%
0.2th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSlinux-azure4.15.0-1008.8, 4.15.0-1019.19, 4.15.0-1009.9
Ubuntu:18.04:LTSlinux-hwe5.0.0-35.38~18.04.1, 0, 4.18.0-13.14~18.04.1
Ubuntu:16.04:LTSlinux4.4.0-6.21, 4.4.0-14.30, 4.4.0-13.29
Ubuntu:24.04:LTSlinux-azure-6.116.11.0-1013.13~24.04.1, 6.11.0-1012.12~24.04.1, 6.11.0-1008.8~24.04.1
Ubuntu:18.04:LTSlinux-hwe-edge5.3.0-24.26~18.04.2, 0, 5.0.0-15.16~18.04.1
Ubuntu:20.04:LTSlinux-raspi25.4.0-1006.6, 0, 5.3.0-1007.8
Ubuntu:24.04:LTSlinux-riscv6.8.0-55.57.1, 6.8.0-20.20.1, 6.5.0-9.9.1
Ubuntu:16.04:LTSlinux-raspi24.4.0-1029.36, 4.4.0-1034.41, 4.2.0-1013.19
Ubuntu:20.04:LTSlinux-gkeop5.4.0-1072.76, 5.4.0-1073.77, 5.4.0-1074.78
Ubuntu:14.04:LTSlinux3.13.0-86.130, 3.11.0-12.19, 3.12.0-1.3
Ubuntu:16.04:LTSlinux-snapdragon4.4.0-1032.36, 4.4.0-1030.33, 4.4.0-1026.29
Ubuntu:Pro:20.04:LTSlinux-azure-fde-5.155.15.0-1072.81~20.04.1.1, 5.15.0-1049.56~20.04.1.1, 5.15.0-1050.57~20.04.1.1
Ubuntu:22.04:LTSlinux-realtime0, 5.15.0-1032.35
Ubuntu:24.04:LTSlinux-lowlatency-hwe-6.116.11.0-1014.15~24.04.1, 6.11.0-1013.14~24.04.1, 6.11.0-1012.13~24.04.1
Ubuntu:22.04:LTSlinux-intel-iot-realtime5.15.0-1073.75, 0
Ubuntu:22.04:LTSlinux-riscv5.15.0-1023.27, 5.15.0-1028.32, 5.15.0-1026.30
Ubuntu:18.04:LTSlinux-oem4.15.0-1004.5, 4.15.0-1065.75, 4.15.0-1064.73
Ubuntu:24.04:LTSlinux-realtime0, 6.8.1-1015.16
Ubuntu:20.04:LTSlinux-azure-fde5.4.0-1063.66+cvm2.2, 5.4.0-1103.109+cvm1.1, 5.4.0-1100.106+cvm1.1
Ubuntu:14.04:LTSlinux-lts-xenial0, 4.4.0-45.66~14.04.1, 4.4.0-42.62~14.04.1

…and 6 more

Timeline

References

Open in Interactive Console →