PatchSiren cyber security CVE debrief
CVE-2016-10154 Linux CVE debrief
CVE-2016-10154 affects Linux kernel 4.9.x before 4.9.1. When CONFIG_VMAP_STACK is enabled, the smbhash function in fs/cifs/smbencrypt.c can interact incorrectly with scatterlists that span more than one virtual page. NVD describes the result as a local denial of service through system crash or memory corruption, with possible unspecified additional impact.
- Vendor
- Linux
- Product
- CVE-2016-10154
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-06
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-06
- Advisory updated
- 2026-05-13
Who should care
Linux administrators, distro security teams, and operators running 4.9.x kernels with CIFS support, especially builds using CONFIG_VMAP_STACK. Systems that allow local users or untrusted local workloads should treat this as relevant.
Technical summary
The flaw is a memory-safety issue in the CIFS smbencrypt.c smbhash path. On affected 4.9.x kernels before 4.9.1, handling a scatterlist that spans multiple virtual pages can go wrong under CONFIG_VMAP_STACK, leading to crash or memory corruption. NVD links the fix to upstream kernel commit 06deeec77a5a689cc94b21a8a91a76e42176685d and the Linux 4.9.1 changelog.
Defensive priority
Medium. The attack requires local access, but the impact includes system crash and possible memory corruption on a widely deployed kernel branch.
Recommended defensive actions
- Upgrade Linux 4.9.x systems to 4.9.1 or a vendor-backported fixed kernel.
- Verify whether CONFIG_VMAP_STACK is enabled in deployed kernels and include it in kernel hardening review.
- Prioritize hosts that expose CIFS/SMB client functionality and allow local user access.
- Use vendor errata, the Linux 4.9.1 changelog, and the linked upstream commit to confirm backported fixes.
- Treat unexplained crashes or memory corruption on affected builds as security-relevant and review kernel logs.
Evidence notes
The supplied NVD record lists CVE-2016-10154 as Medium with CVSS 3.0 vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H and CWE-119. NVD marks Linux kernel 4.9.x as vulnerable and references the upstream fix commit, the Linux 4.9.1 changelog, an oss-security post, a Red Hat bug entry, and a GitHub mirror of the patch. The CVE was published on 2017-02-06. The supplied enrichment data does not mark this CVE as a CISA KEV item.
Official resources
-
CVE-2016-10154 CVE record
CVE.org
-
CVE-2016-10154 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Release Notes, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
Publicly disclosed in the CVE/NVD record on 2017-02-06; no CISA KEV listing is present in the supplied enrichment data.