The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.
2017-02-07T07:59:00.293
2025-04-20T01:37:25.860
Deferred
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | < 3.16.43 | Yes |
Operating System | linux | linux_kernel | < 4.4.24 | Yes |
Operating System | linux | linux_kernel | < 4.7.7 | Yes |
Operating System | android | ≤ 7.1.1 | Yes |