CVE Details

Release Date:2016-09-16


The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.

See more information about CVE-2016-10044 from MITRE CVE dictionary and NIST NVD

CVSS v2.0 metrics

NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.

Base Score: 7.2 Base Metrics: AV:L/AC:L/Au:N/C:C/I:C/A:C
Access Vector: Local network Attack Complexity: Low
Authentication: None required Confidentiality Impact: Complete
Integrity Impact: Complete Availability Impact: Complete

Errata information

PlatformErrataRelease Date
Oracle Linux version 5 (kernel-uek)ELSA-2017-36372017-11-02
Oracle Linux version 6 (dtrace-modules-3.8.13-118.19.12.el6uek)ELSA-2017-36362017-11-02
Oracle Linux version 6 (kernel-uek)ELSA-2017-36362017-11-02
Oracle Linux version 6 (kernel-uek)ELSA-2017-36372017-11-02
Oracle Linux version 7 (dtrace-modules-3.8.13-118.19.12.el7uek)ELSA-2017-36362017-11-02
Oracle Linux version 7 (kernel-uek)ELSA-2017-36362017-11-02
Oracle VM version 3.3 (kernel-uek)OVMSA-2017-01682017-11-03

This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team