Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-10044

Опубликовано: 07 фев. 2017
Источник: debian
EPSS Низкий

Описание

The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.7.8-1package
linuxfixed3.16.43-1jessiepackage
linuxno-dsawheezypackage

EPSS

Процентиль: 2%
0.00016
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.

CVSS3: 7
redhat
почти 9 лет назад

The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.

CVSS3: 7.8
nvd
больше 8 лет назад

The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.

CVSS3: 7.8
github
около 3 лет назад

The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.

CVSS3: 7.8
fstec
почти 9 лет назад

Уязвимость функции aio_mount в fs/aio.c ядра операционной системы Android, позволяющая нарушителю обойти политику ограничений и повысить свои привилегии

EPSS

Процентиль: 2%
0.00016
Низкий