⚠ Actively exploited
Added to CISA KEV on 2022-03-03. Federal agencies required to patch by 2022-03-24. Required action: Apply updates per vendor instructions..
CVE-2016-5195
Severity
7.0HIGH
EPSS
94.2%
top 0.08%
CISA KEV
KEV
Added 2022-03-03
Due 2022-03-24
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedNov 10
KEV addedMar 3
KEV dueMar 24
Latest updateAug 9
CISA Required Action: Apply updates per vendor instructions.
Description
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9
Affected Packages5 packages
▶CVEListV5linux/linux9ae0f87d009ca6c4aab2882641ddfc319727e3db — 9def52eb10baab3b700858003d462fcf17d62873+2
Also affects: Debian Linux 7.0, 8.0, Ubuntu Linux 12.04, 14.04, 16.04, 16.10, Enterprise Linux 5, 6.0, 7.0, 6.2, 6.4, 6.5, 6.6, 6.7, 7.1, Fedora 23, 24, 25
Patches
🔴Vulnerability Details
8Project0
▶
Project0
▶
💥Exploits & PoCs
5Exploit-DB▶
Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' 'PTRACE_POKEDATA' Race Condition Privilege Escalation (/etc/passwd Method)↗2016-11-28
Exploit-DB▶
Linux Kernel 2.6.22 < 3.9 - 'Dirty COW /proc/self/mem' Race Condition Privilege Escalation (/etc/passwd Method)↗2016-11-27
Exploit-DB▶
Linux Kernel 2.6.22 < 3.9 - 'Dirty COW PTRACE_POKEDATA' Race Condition (Write Access Method)↗2016-10-26
Exploit-DB▶
Linux Kernel 2.6.22 < 3.9 (x86/x64) - 'Dirty COW /proc/self/mem' Race Condition Privilege Escalation (SUID Method)↗2016-10-21
Exploit-DB▶
Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' /proc/self/mem Race Condition (Write Access Method)↗2016-10-19
🔍Detection Rules
17📋Vendor Advisories
12Android▶
CVE-2016-5195: Android Security Bulletin 2016-11-01
CVE: CVE-2016-5195
Severity: CRITICAL
Affected AOSP versions: 3↗2016-11-01