VYPR
High severity7.8NVD Advisory· Published Nov 28, 2016· Updated May 6, 2026

CVE-2016-9644

CVE-2016-9644

Description

The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the Linux kernel 4.4.22 through 4.4.28 contains extended asm statements that are incompatible with the exception table, which allows local users to obtain root access on non-SMEP platforms via a crafted application. NOTE: this vulnerability exists because of incorrect backporting of the CVE-2016-9178 patch to older kernels.

Affected products

7
  • Linux/Kernel7 versions
    cpe:2.3:o:linux:linux_kernel:4.4.22:*:*:*:*:*:*:*+ 6 more
    • cpe:2.3:o:linux:linux_kernel:4.4.22:*:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:4.4.23:*:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:4.4.24:*:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:4.4.25:*:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:4.4.26:*:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:4.4.27:*:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:4.4.28:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.