Description
The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the Linux kernel 4.4.22 through 4.4.28 contains extended asm statements that are incompatible with the exception table, which allows local users to obtain root access on non-SMEP platforms via a crafted application. NOTE: this vulnerability exists because of incorrect backporting of the CVE-2016-9178 patch to older kernels.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-10445 | The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the Linux kernel 4.4.22 through 4.4.28 contains extended asm statements that are incompatible with the exception table, which allows local users to obtain root access on non-SMEP platforms via a crafted application. NOTE: this vulnerability exists because of incorrect backporting of the CVE-2016-9178 patch to older kernels. |
Ubuntu USN |
USN-3146-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3146-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3161-4 | Linux kernel (Qualcomm Snapdragon) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T02:59:03.223Z
Reserved: 2016-11-27T00:00:00.000Z
Link: CVE-2016-9644
No data.
Status : Modified
Published: 2016-11-28T03:59:18.283
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-9644
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN